Hi @Andrew ,
AFAIK, NVMe disks in Lasv3 VMs are ephemeral and use hardware encryption with a Platform-Managed Key (PMK). Azure does not expose PMK encryption status in the UI or through PowerShell/CLI. Unlike managed OS and data disks (which show encryption status under "Disk Encryption"), NVMe local disks do not appear in the portal.
Temp NVMe disks support the feature of data encryption at rest. A unique data encryption key (DEK) encrypts the data for each temp NVMe disk assigned to the VM. A key encryption key (KEK) helps protect the DEK. When you delete a VM, the data on its temp NVMe disk is cryptographically erased. All the v6 VMs that are introduced from 2024 and onward, have their local NVMe drives encrypted by default using hardware based encryption with a Platform Managed Key.
How can I identify my temp NVMe disk?
Run: Get-PhysicalDisk | where { $_.FriendlyName.contains("NVMe Direct Disk")}
Platform-managed keys (PMKs) are encryption keys generated, stored, and managed entirely by Azure. Customers do not interact with PMKs. The keys used for Azure Data Encryption-at-Rest, for instance, are PMKs by default.
I will try to communicate your concern with the product team!
Hope this helps!
Let me know if you have any further queries!
If the information is helpful, please click "Accept Answer" and "Upvote it."