π‘οΈ Google BigQuery Table is not encrypted with Customer-Managed Encryption Key (CMEK)π’
- Contextual name: π‘οΈ Table is not encrypted with Customer-Managed Encryption Key (CMEK)π’
- ID:
/ce/ca/google/big-query/table-cmek-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Enable BigQuery Encryption with Customer-Managed Keys
Descriptionβ
Descriptionβ
BigQuery by default encrypts data at rest by employing
Envelope Encryptionusing Google managed cryptographic keys. The data is encrypted using thedata encryption keysand data encryption keys themselves are further encrypted usingkey encryption keys. This is seamless and does not require any additional input from the user. However, if you want greater control, customer-managed encryption keys (CMEK) can be used as an encryption key management solution for BigQuery datasets. If CMEK is used, the CMEK encrypts the data encryption keys instead of using Google-managed encryption keys.Rationaleβ
BigQuery by default encrypts data at rest by employing
Envelope Encryptionusing Google managed cryptographic keys. This is seamless and does not require any additional input from the user.For greater control over encryption, customer-managed encryption keys (CMEK) can be used as an encryption key management solution for BigQuery tables. The CMEK is used to encrypt the data encryption keys instead of using Google-managed encryption keys. BigQuery stores the table and CMEK association and the encryption/decryption is done automatically.
... see more
Remediationβ
Remediationβ
From Google Cloud CLIβ
Use the following command to copy the data. The source and destination need to be the same when copying to the original table.
bq cp \
--destination_kms_key {{customer-managed-key}} source_dataset.source_table destination_dataset.destination_table