Skip to content
This repository has been archived by the owner on Jul 2, 2024. It is now read-only.

Commit

Permalink
cmek algorithm
Browse files Browse the repository at this point in the history
  • Loading branch information
filiphaftek committed Apr 17, 2024
1 parent e885ae1 commit aadb7c0
Showing 1 changed file with 4 additions and 1 deletion.
5 changes: 4 additions & 1 deletion content/departments/cloud/technical-docs/cmek.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@ Benefits:
- customer data is encrypted using a non-default key not provided by Google, ensuring that neither Google nor any other entity can decrypt the data.
- database data is encrypted with a different key as GKE persistent volumes, to increase security
- dedicated CMEK can be rotated manually or automatically when required
- [AES_256_CTR](https://cloud.google.com/kms/docs/reference/rest/v1/CryptoKeyVersionAlgorithm) algorithm is used for encryption/descryption with `SOFTWARE` protection level

## How to enable CMEK

Expand All @@ -19,9 +20,11 @@ or
modify instance `config.yaml` with given annotation:

```yaml
"cloud.sourcegraph.com/enable-cmek" = "true"
"cloud.sourcegraph.com/cmek-algorithm" = "AES_256_CTR"
```

> [!WARNING] If customer wants to use different algoritm, please contact Security Team.
## How to disable CMEK

When CMEK is enabled for instances, it cannot be disabled. Changing this configuration after the instance is created will require recreation of CloudSQL and Persistent Volumes, which will result in a loss of all data.

0 comments on commit aadb7c0

Please sign in to comment.