Overview
io.net provisioned Confidential Compute VMs are equipped with NVIDIA H200 GPUs featuring hardware-based confidential computing capabilities. This guide shows you how to verify that your GPUs are genuine NVIDIA hardware with confidential computing features properly enabled.Key Takeaways
- Understand why GPU verification is essential for confidential computing.
- Learn how to confirm GPU authenticity using cryptographic attestation.
- Follow clear, step-by-step instructions to run verification on your VM.
Prerequisites
- SSH access to your Confidential Compute VM
- Python 3.7 or later (pre-installed on your VM)
- Basic command line understanding
- 5 minutes to perform the initial set up
Why does GPU verification matter?
Trust, but Verify
When running sensitive workloads on Confidential Computing (CC) infrastructure, it is not enough to rely on a provider’s assurances. You need cryptographic proof that the hardware is authentic, correctly configured, and operating in a secure state. GPU attestation provides independent verification that:- The GPUs are genuine NVIDIA hardware - not counterfeit, emulated, or misrepresented.
- Firmware is intact and unmodified - ensuring no tampering with GPU software or drivers.
- Confidential computing features are enabled - confirming that CC mode is active and functioning properly.
- Hardware measurements match expected “golden” values - validating that the GPU’s state aligns with NVIDIA’s reference integrity manifests.
Security and Compliance
GPU attestation is a foundational security mechanism for confidential computing environments. It helps ensure:- Zero-trust architecture - trust no component by default, verify every claim cryptographically.
- Regulatory and compliance adherence - meet requirements that mandate hardware verification.
- Data protection - guarantee that sensitive workloads run only on validated, trustworthy hardware.
- Clear auditability - produce cryptographic evidence for stakeholders, security teams, and auditors.
How It Works
Attestation relies on cryptographic proofs that cannot be falsified, forged or altered. The verification process follows a clear chain of checks:- A four-level GPU certificate chain, traced back to the NVIDIA Root Certificate Authority.
- Certificate revocation status, checked via OCSP to ensure no certificates have been revoked.
- Driver firmware measurements, consisting of 64 SHA-384 cryptographic hashes.
- VBIOS firmware measurements, consisting of 64 SHA-384 cryptographic hashes.
- Digital signatures on all attestation evidence, ensuring integrity and authenticity.
What is GPU Attestation?
Cryptographic Proof of Authenticity
GPU attestation is a cryptographic verification process rooted in hardware-based trust. It provides verifiable proof that a GPU is authentic, securely configured, and operating in a trusted state. Specifically, it validates four core properties:- 1. Hardware Authenticity
- 2. Firmware Integrity
- 3. Configuration State
- 4. Freshness
Every NVIDIA GPU that supports Confidential Computing includes:
The GPU is genuine NVIDIA hardware, produced by NVIDIA, and not counterfeit or emulated.
- A unique hardware identity permanently embedded in silicon during manufacturing.
- A certificate chain signed by NVIDIA’s Root Certificate Authority.
- Cryptographic keys stored in tamper-resistant hardware.
The GPU is genuine NVIDIA hardware, produced by NVIDIA, and not counterfeit or emulated.
Official NVIDIA Technology
GPU attestation is performed using NVIDIA’s official tooling:- Package:
nv-attestation-sdk(official NVIDIA Python SDK) - Source: PyPI (Python Package Index)
- Version: 2.6.3 (as of December 2025)
- License: Apache 2.0
- Repository: https://github.com/NVIDIA/nvtrust
Standards-Based Approach
NVIDIA GPU attestation is built on widely adopted industry standards:- SPDM (Security Protocol and Data Model): Version 1.1 for device authentication.
- X.509 PKI: Standard public key infrastructure for certificates.
- OCSP: Online Certificate Status Protocol for revocation checks.
- TCG standards: Trusted Computing Group measurement and attestation specifications.
Quick Reference
One-time setup (approximately 2–3 minutes):Key Points
- Official NVIDIA tooling - uses the NVIDIA-provided
nv-attestation-sdk. - Cryptographic assurance - verification cannot be forged or bypassed.
- Comprehensive validation - certificates, firmware measurements, and signatures are all verified.
- Fast execution - completes in approximately 30 seconds after initial setup.
- Self-contained operation - runs entirely within the virtual machine without external accounts.
Next Steps
- Complete the one-time setup.
- Run GPU verification on the virtual machine.
- Integrate verification into the security or deployment workflow.
- Perform verification before processing sensitive workloads.
- Contact support if verification fails.
FAQs
How often should verification be performed?
How often should verification be performed?
Recommended frequency:
- Daily: Before processing sensitive or regulated workloads.
- After system changes: Following any reboot, update, or migration.
- Initial provisioning: When the virtual machine is first received.
- Compliance requirements: As dictated by organizational security policies.
- Detects firmware tampering or unauthorized modification.
- Confirms that Confidential Computing features remain enabled after updates.
- Provides a verifiable audit trail for compliance and governance.
Can verification be automated?
Can verification be automated?
Yes. Verification can be integrated into startup or pre-workload scripts.
Does verification impact GPU performance?
Does verification impact GPU performance?
No. Verification:
- Runs independently of GPU compute workloads.
- Typically completes within 30–60 seconds.
- Does not interfere with running applications.
- Can be executed while GPUs are performing other tasks.
What should I do if verification fails?
What should I do if verification fails?
Immediate steps to follow:
- Retry the verification once, as failures may be caused by transient network issues.
- Review system logs using
journalctl -xe. - Confirm that the NVIDIA driver is installed and functioning using
nvidia-smi. - Contact support and provide complete error messages and output.
Is this the same verification NVIDIA uses?
Is this the same verification NVIDIA uses?
Yes. This verification process uses:
- The official NVIDIA Python SDK (
nv-attestation-sdk). - The same verification logic used by NVIDIA enterprise customers.
- Reference Integrity Manifests and certificate chains served directly by NVIDIA.
- Industry-standard cryptographic validation mechanisms.
What exactly is verified?
What exactly is verified?
The verification process validates the following components:Hardware
- The GPU is genuine NVIDIA hardware, verified through a certificate chain to the NVIDIA Root Certificate Authority.
- The hardware identity matches the issued certificates.
- Certificates have not been revoked, as verified through OCSP.
- Driver firmware measurements (64 SHA-384 cryptographic hashes).
- VBIOS firmware measurements (64 SHA-384 cryptographic hashes).
- Measurements match NVIDIA’s reference “golden” RIM values.
- All firmware and measurement signatures are cryptographically valid.
- Confidential Computing mode is enabled.
- Protected PCIe (PPCIE) is correctly configured.
- The GPU ready state is operational.
Can verification results be falsified?
Can verification results be falsified?
No. Verification is based on strong cryptographic guarantees, including:
- A hardware root of trust, with cryptographic keys embedded in tamper-resistant silicon.
- Certificate chains signed by NVIDIA’s Root Certificate Authority, protected by NVIDIA’s private keys.
- Cryptographic signatures that cannot be forged without NVIDIA’s private keys.
- Fresh nonces that prevent replay of previously captured attestation results.
- Forge NVIDIA’s digital signatures.
- Create certificates that successfully validate against the NVIDIA Root CA.
- Modify firmware measurements without detection.
- Bypass the hardware root of trust.
What does verification not prove?
What does verification not prove?
GPU attestation verifies GPU authenticity and configuration, but it DOES NOT validate:
GPU attestation should be used as part of a defense-in-depth security strategy.
- Hypervisor security or configuration.
- Host operating system security.
- Network isolation between virtual machines.
- Physical datacenter security.
- Guest operating system security within the VM.
GPU attestation should be used as part of a defense-in-depth security strategy.
How do I verify the verification tool itself?
How do I verify the verification tool itself?
The verification tooling can be independently validated through the following means:
-
Official NVIDIA package distribution: Published on PyPI
- Open-source implementation: Publicly available for review Repository: https://github.com/NVIDIA/nvtrust
-
Package signing: Signed and distributed by NVIDIA
-
Checksum verification: Validate package integrity
Why does the CC State show as OFF when I check my onboarded node?
Why does the CC State show as OFF when I check my onboarded node?
This is expected for nodes with NVLink-connected GPUs. CC State is only used when individual GPUs (or non-NVLink GPUs) are passed into a VM. Because NVLink-connected GPUs must be passed through as a complete set, CC State remains
OFF.For these nodes, confidentiality is provided through Protected PCIe, not CC State. You can confirm this by checking:Multi-GPU Mode: Protected PCIe→ GPUs are running in confidential mode.CPU CC Capabilities: INTEL TDX→ CPU is running in confidential mode.