π‘οΈ Google BigQuery Table is not encrypted with Customer-Managed Encryption Key (CMEK)π’
- Contextual name: π‘οΈ Table is not encrypted with Customer-Managed Encryption Key (CMEK)π’
- ID:
/ce/ca/google/big-query/table-cmek-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Enable BigQuery Encryption with Customer-Managed Keys
Descriptionβ
Descriptionβ
BigQuery by default encrypts the data as rest by employing
Envelope Encryptionusing Google managed cryptographic keys. The data is encrypted using thedata encryption keysand data encryption keys themselves are further encrypted usingkey encryption keys. This is seamless and do not require any additional input from the user. However, if you want to have greater control, Customer-managed encryption keys (CMEK) can be used as encryption key management solution for BigQuery Data Sets. If CMEK is used, the CMEK is used to encrypt the data encryption keys instead of using google-managed encryption keys.Rationaleβ
BigQuery by default encrypts the data as rest by employing
Envelope Encryptionusing Google managed cryptographic keys. This is seamless and does not require any additional input from the user.For greater control over the encryption, customer-managed encryption keys (CMEK) can be used as encryption key management solution for BigQuery tables. The CMEK is used to encrypt the data encryption keys instead of using google-managed encryption keys. BigQuery stores the table and CMEK association and the encryption/decryption is done automatically.
... see more
Remediationβ
Remediationβ
From Google Cloud CLIβ
Use the following command to copy the data. The source and the destination needs to be same in case copying to the original table.
bq cp --destination_kms_key <customer_managed_key> source_dataset.source_table destination_dataset.destination_table