Type something to search...
Unlocking Secure AI Workloads with Confidential VMs

Unlocking Secure AI Workloads with Confidential VMs

As the AI landscape continues to evolve, the need for secure and confidential computing has become a top priority. This move reflects broader industry trends towards prioritizing data protection and security in cloud computing. At the OpenInfra Summit Europe 2025, NVIDIA emphasized the importance of combining Kata Containers with Confidential Computing to preserve bare-metal GPU performance while preventing cloud operators from inspecting sensitive model and data.

Kata Containers, an open-source project, provides lightweight VMs for containers, using hardware virtualization technology to launch a separate VM for each container. This approach offers the performance benefits of containers along with the security and workload isolation of VMs. Confidential Computing, on the other hand, brings in-memory data and application encryption, ensuring that even the cloud provider cannot access sensitive information.

The combination of Kata Containers and Confidential Computing is not a silver bullet, but it substantially reduces the opportunity for cloud operators or co-tenants to access sensitive model artifacts or training data. As Zvonko Kaiser, NVIDIA principal systems engineer, explained, “We do not trust the infrastructure.” This approach holds that the workload is trusted, but the infrastructure is not, and therefore, the VM is encrypted, and even the cloud provider cannot snapshot or inspect guest memory.

NVIDIA is working to make GPU workloads “lift-and-shift” into Kata/confidential VMs without losing performance or functionality. This effort includes support for PCIe pass-through, Single Root IO Virtualization (SR-IOV), GPUDirect Remote Direct Memory Access (RDMA), and per-pod runtime configurations. The company’s Virtualization Reference Architecture (VRA) addresses the thorny problem of PCIe topology and peer-to-peer GPU communication inside VMs, supporting two approaches: flattening the hierarchy and host-topology replication.

The importance of attestation cannot be overstated, as it provides a cryptographic proof that the VM and its boot/guest state match an expected configuration. This enables a full-stack trust model across the control plane, worker nodes, and pods. NVIDIA is collaborating with Red Hat, IBM, and the open-source Kata community to upstream the VRA and tooling, including host-topology detection and performance guides.

In the context of the rapidly evolving AI landscape, NVIDIA’s approach to running sensitive AI workloads at scale has significant implications. By combining Kata Containers, Confidential Computing, and GPU device mapping abstractions, the company is paving the way for a new AI stack that prioritizes security and performance. As the industry continues to shift towards confidential computing, this development is likely to have a profound impact on the future of AI and cloud computing.

Source: https://thenewstack.io/how-to-get-bare-metal-gpu-performance-in-confidential-vms

Stay Ahead in Tech

Join thousands of developers and tech enthusiasts. Get our top stories delivered safely to your inbox every week.

No spam. Unsubscribe at any time.

Related Posts

2025 AI Recap: Top Trends and Bold Predictions for 2026

2025 AI Recap: Top Trends and Bold Predictions for 2026

If 2025 taught us anything about artificial intelligence, it's that the technology has moved decisively from experimentation to execution. This year marked a turning point where AI transitioned from b

read more
2025 Tablet Showdown: Five Flagship Tablets Compared

2025 Tablet Showdown: Five Flagship Tablets Compared

The tablet market in 2025 has evolved beyond "bigger smartphones" into specialized productivity powerhouses. With dedicated NPU processors for on-device AI, mature desktop experiences like Samsung DeX

read more
VPN Technology in 2025: A Comprehensive Guide to Protocols, Security, and Provider Comparison

VPN Technology in 2025: A Comprehensive Guide to Protocols, Security, and Provider Comparison

By 2025, Virtual Private Network (VPN) technology has evolved from a niche cybersecurity tool into a mainstream infrastructure component trusted by approximately one-third of global internet users. Th

read more
2026 Smartphones: What to Expect from Apple, Samsung, and Google

2026 Smartphones: What to Expect from Apple, Samsung, and Google

Key HighlightsApple is expected to launch the iPhone 18 Pro and Pro Max with new colors and improved cameras Samsung will unveil the Galaxy S26 series with enhanced displays and faster charging Google

read more
AWS Outage: A Cautionary Tale of Cascading Failures

AWS Outage: A Cautionary Tale of Cascading Failures

The Ripple Effect of a Single Misconfiguration On October 20th, 2025, Amazon Web Services (AWS) experienced a significant outage in its US-EAST-1 Region, affecting numerous cloud services, including A

read more
Revolutionizing DNA Research with a Search Engine

Revolutionizing DNA Research with a Search Engine

The rapid advancement of DNA sequencing technologies has led to an explosion of genomic data, with over 100 petabytes of information currently stored in central databases such as the American SRA and

read more
OpenAI Enhances GPT-5 Safety

OpenAI Enhances GPT-5 Safety

As the use of AI models like GPT-5 becomes increasingly widespread, the need for these models to handle sensitive conversations with care and empathy has never been more pressing. This move reflects b

read more
AI Coders Can Finally See What They're Building — Antigravity and Uno Platform Make It Happen

AI Coders Can Finally See What They're Building — Antigravity and Uno Platform Make It Happen

Here's a scenario every developer knows too well: your AI coding assistant writes a beautiful chunk of code, the compiler gives you a green light, and you feel like a productivity superhero — until yo

read more
A Senior Engineer's Guide to Prompting AI for Real Code

A Senior Engineer's Guide to Prompting AI for Real Code

If your idea of using AI for coding still involves tabbing twice to accept a generic boilerplate function, we need to talk. We're way past the era of mere code completion. As of early 2026, OpenAI Cod

read more