π‘οΈ Google BigQuery Dataset is not encrypted with Customer-Managed Encryption Key (CMEK)π’
- Contextual name: π‘οΈ Dataset is not encrypted with Customer-Managed Encryption Key (CMEK)π’
- ID:
/ce/ca/google/big-query/dataset-cmek-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Enable BigQuery Dataset Encryption with Customer-Managed Encryption Keys
Descriptionβ
Descriptionβ
BigQuery by default encrypts the data as rest by employing
Envelope Encryptionusing Google managed cryptographic keys. The data is encrypted using thedata encryption keysand data encryption keys themselves are further encrypted usingkey encryption keys. This is seamless and do not require any additional input from the user. However, if you want to have greater control, Customer-managed encryption keys (CMEK) can be used as encryption key management solution for BigQuery Data Sets.Rationaleβ
BigQuery by default encrypts the data as rest by employing
Envelope Encryptionusing Google managed cryptographic keys. This is seamless and does not require any additional input from the user.For greater control over the encryption, customer-managed encryption keys (CMEK) can be used as encryption key management solution for BigQuery Data Sets. Setting a Default Customer-managed encryption key (CMEK) for a data set ensure any tables created in future will use the specified CMEK if none other is provided.
... see more
Remediationβ
Remediationβ
From Google Cloud CLIβ
The default CMEK for existing data sets can be updated by specifying the default key in the
EncryptionConfiguration.kmsKeyNamefield when calling thedatasets.insertordatasets.patchmethods