GCP PlayCloud Labs
-
GCP PlayCloud Labs
-
Guided Lab: How to Launch a GCP Compute Engine Linux Instance
-
Guided Lab: Creating a VM Using Instance Templates
-
Guided Lab: Creating and Managing Instance Groups in Compute Engine
-
Guided Lab: Creating a Spot VM Instance
-
Guided Lab: Configuring Shielded VM Options
-
Guided Lab: Exploring Instance Metadata in Google Cloud
-
Guided Lab: Vertically Scaling a VM Instance
-
Guided Lab: Setting up a Web Server on a VM Instance
-
Guided Lab: Using Startup Scripts in GCP VM Instances
-
Guided Lab: Creating a Custom Image from a VM Instance with Web Server in Google Cloud
-
Guided Lab: Creating VM Snapshots and Restoring a VM from a Snapshot
-
Guided Lab: Setting Up and Managing a Database on a VM Instance
-
Guided Lab: Installing WordPress on an Ubuntu VM Instance with LEMP Stack
-
Guided Lab: Deploying a LAMP Stack on a Compute Engine VM
-
Guided Lab: Reserving or Promoting a Static IP Address for a VM Instance
-
Guided Lab: SSH Access to GCP VM Instance from Local Machine using SSH Key Pair
-
Guided Lab: Guarding Your VM with Deletion Protection
-
Guided Lab: Setting Up a Linux Bastion Host on GCP
-
Guided Lab: Creating a Cloud Storage Bucket
-
Guided Lab: Uploading, Organizing, and Managing Objects in Cloud Storage
-
Guided Lab: Exploring Google Cloud Storage Classes
-
Guided Lab: Hosting a Static Website in Google Cloud Storage Bucket
-
Guided Lab: Protecting Data on Cloud Storage Bucket Against Accidental Delete and Overwrite Using Object Versioning
-
Guided Lab: Using Cloud Storage Lifecycle Rules to Automate Object Management
-
Guided Lab: Managing Cloud Storage Buckets via SSH Commands
-
Guided Lab: Creating a Cloud SQL Instance
-
Guided Lab: Running SQL Commands in Cloud SQL Studio
-
Guided Lab: Creating and Restoring Cloud SQL Backups
-
Guided Lab: Integrating Cloud SQL Database instance with a VM instance
-
Guided Lab: Connecting Cloud SQL Database with MySQL Workbench (Local)
-
Guided Lab: Guarding Your Cloud SQL Instances with Deletion Protection
-
Guided Lab: Creating a Cloud NAT Gateway
-
Guided Lab: Creating a Google Kubernetes Engine (GKE) Cluster
-
Guided Lab: Connecting to a Kubernetes Engine Cluster
-
Guided Lab: Deploying a Simple Web Application on GKE
-
Guided Lab: Creating a Custom Virtual Private Cloud (VPC)
-
Guided Lab: Establishing VPC Peering for Secure Cross‑Network Communication
-
Guided Lab: Configuring Firewall Rules to Secure and Access a VM
-
Guided Lab: Creating an Application Load Balancer
-
Guided Lab: Creating a Network Load Balancer
Guided Lab: Configuring Shielded VM Options
Description
Shielded VMs in Google Cloud provide enhanced security features that help protect against rootkits and boot‑ or kernel-level malware. They use Secure Boot, a virtual Trusted Platform Module (vTPM), and Integrity Monitoring to ensure that your VM’s boot process has not been tampered with.
These features are especially valuable for workloads that require strong security guarantees, such as financial applications, healthcare systems, or regulated environments. By enabling Shielded VM options, you add an extra layer of defense to your Compute Engine instances without changing how you deploy or manage them.
In this guided lab, you will learn how to create a Shielded VM instance in Google Cloud and verify that its security features are active
Prerequisites
To ensure the successful completion of this lab, you must have prior experience in creating VM instances and be familiar with their essential components. If you feel that your knowledge in this area is insufficient, we highly recommend taking this lab to gain the necessary understanding:
Objectives
In this lab, you will:
- Create a Shielded VM instance.
- Verify that Secure Boot, vTPM, and Integrity Monitoring are enabled.
- Test Secure Boot status via system logs.
- Confirm the presence of the vTPM device inside the VM.
Lab Steps
Create a Shielded VM Instance
1. In the Cloud Console, navigate to Compute Engine → VM instances.
2. Click Create instance.
3. Enter the desired name.
4. Select a machine type (e.g., e2-small).
5. Expand the Security section:
- Check Enable Secure Boot.
- Check Enable vTPM.
- Check Enable Integrity Monitoring.

6. Leave other configurations at their default values.
7. Click Create.
Verify Shielded VM Options
1. Once the VM is running, click on the instance name.

2. Scroll to the Security section.

3. Confirm that Secure Boot, vTPM, and Integrity Monitoring are shown as On.

Test Secure Boot
1. Connect to the VM via SSH.
2. Run:
sudo journalctl -k | grep -i secure

3. This confirms Secure Boot status in kernel logs.
Test vTPM Device
1. From the SSH session, run:
ls /dev/tpm*
2. You should see a TPM device (e.g., /dev/tpm0).

3. This confirms that the virtual Trusted Platform Module (vTPM) is available to the VM.
4. Applications can use this device for attestation and cryptographic operations.
Congratulations! You have successfully created a Shielded VM instance in Google Cloud. You enabled Secure Boot, vTPM, and Integrity Monitoring, connected via SSH, and verified that these protections are active. This workflow demonstrates how Shielded VMs provide a stronger security posture for sensitive workloads, ensuring that your VM’s boot process is protected against tampering and unauthorized changes.