A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from http://cloud.google.com/kubernetes-engine/docs/add-on/backup-for-gke/concepts/about-cmek below:

About Backup for GKE CMEK encryption

Autopilot Standard

By default, Backup for GKE encrypts customer content at rest. Backup for GKE handles encryption for you without any additional actions on your part. This option is called Google default encryption.

If you want to control your encryption keys, then you can use customer-managed encryption keys (CMEKs) in Cloud KMS with CMEK-integrated services including Backup for GKE. Using Cloud KMS keys gives you control over their protection level, location, rotation schedule, usage and access permissions, and cryptographic boundaries. Using Cloud KMS also lets you view audit logs and control key lifecycles. Instead of Google owning and managing the symmetric key encryption keys (KEKs) that protect your data, you control and manage these keys in Cloud KMS.

After you set up your resources with CMEKs, the experience of accessing your Backup for GKE resources is similar to using Google default encryption. For more information about your encryption options, see Customer-managed encryption keys (CMEK).

Overview

There are two types of user data artifacts that are produced and stored by Backup for GKE:

By default, all backup artifacts produced by Backup for GKE are encrypted at rest using a Google-supplied key.

However, you may choose to have these artifacts encrypted using a customer-managed encryption key (CMEK) managed with the Cloud Key Management Service.

Enable CMEK encryption

Enabling CMEK encryption involves two steps:

For any particular backup scenario, there are potentially three CMEK keys involved:

There are four different service accounts that may require access to CMEK keys:

If diskEncryptionKey.kmsKeyServiceAccount is set for the disks, you will need to perform the following steps before creating a backup:

If you're performing a cross-project backup or cross-project restore operation, there are three project names that must be listed:

The following table summarizes which service accounts must be granted access to which keys in various scenarios:

Artifact Service account Project number Key config backup cluster agent_robot bplan_key backup of CMEK-encrypted volume cmek_service_agent backup_project orig_disk_key backup of google-encrypted volume non_cmek_service_agent backup_project bplan_key new CMEK-encrypted volume created during restore compute_service_agent restore_project new_disk_key

You can choose to grant access to keys at a project level, which grants access to all keys in that project, or to the individual key.

Grant project level access

You can grant access to keys at a project level, which grants access to all keys in that project.

Use the following instructions to grant access at a project level.

Console
  1. In the Google Cloud console, go to the IAM page.

    Go to IAM

  2. Click Grant access.

  3. In the New principals field, enter the email address of the service account.

  4. From the Select a role list, select the Cloud KMS CryptoKey Encrypter/Decrypter role.

  5. Click Save.

gcloud
  1. Grant access at a project level.

    gcloud projects add-iam-policy-binding PROJECT_ID \
    --member serviceAccount:service-PROJECT_NUMBER@gcp-sa-gkebackup.iam.gserviceaccount.com \
    --role roles/cloudkms.cryptoKeyEncrypterDecrypter
    

    Replace the following:

Terraform
  1. Grant access at a project level.

    resource "google_project_iam_member" "example_iam_member" {
    project = "PROJECT_ID"
    role    = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
    member  = "serviceAccount:service-PROJECT_NUMBER@gcp-sa-gkebackup.iam.gserviceaccount.com"
    }
    

    Replace the following:

Grant access at key level

Use the following instructions to grant access at the individual key level.

Console
  1. In the Google Cloud console, go to the Key management page.

    Go to Key management

  2. Click the name of the key ring.

  3. Click the name of the key.

  4. Click the Permissions tab.

  5. Click Grant access.

  6. In the New principals field, enter the email address of the service account.

  7. From the Select a role list, select the Cloud KMS CryptoKey Encrypter/Decrypter role.

  8. Click Save.

gcloud
  1. Grant access at the individual key level.

    gcloud kms keys add-iam-policy-binding KEY_NAME \
    --keyring KEY_RING \
    --location LOCATION \
    --member "serviceAccount:service-PROJECT_NUMBER@gcp-sa-gkebackup.iam.gserviceaccount.com" \
    --role roles/cloudkms.cryptoKeyEncrypterDecrypter
    

    Replace the following:

Terraform
  1. Grant access at the individual key level.

    resource "google_kms_crypto_key_iam_member" "crypto_key_iam_member" {
    crypto_key_id = "projects/PROJECT_ID/locations/LOCATION/keyRings/KEY_RING/cryptoKeys/KEY_NAME"
    role          = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
    member        = "serviceAccount:service-PROJECT_NUMBER@gcp-sa-gkebackup.iam.gserviceaccount.com" 
    }
    

    Replace the following:

Usage considerations and limitations Use and manage external keys

You can use Cloud External Key Manager (Cloud EKM) to create and manage external keys. External keys are pointers to keys that reside outside of Google Cloud. These keys reside with a supported external key management partner. For more information, see Cloud External Key Manager.

After you create an external key with Cloud EKM, you can apply it to a new backup plan by providing the ID of that key when creating a new backup plan. This procedure is the same as applying a Cloud KMS key to a new backup plan.

You can use Key Access Justifications as part of Cloud EKM. Key Access Justifications lets you view the reason for each Cloud EKM request. Additionally, based on the justification provided, you can automatically approve or deny a request. For more information, see Overview.

Note: To use Key Access Justifications with Cloud EKM, you can create a new backup plan. If you need to apply Key Access Justifications to an existing backup plan, update the backup plan.

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4