π‘οΈ Google GCE Disk for critical VMs is not encrypted with Customer-Supplied Encryption Key (CSEK)π’
- Contextual name: π‘οΈ Disk for critical VMs is not encrypted with Customer-Supplied Encryption Key (CSEK)π’
- ID:
/ce/ca/google/compute-engine/disk-csek-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Cloud Conformity: Enable VM Disk Encryption with Customer-Supplied Encryption Keys
Descriptionβ
Descriptionβ
Customer-Supplied Encryption Keys (CSEK) are a feature in Google Cloud Storage and Google Compute Engine. If you supply your own encryption keys, Google uses your key to protect the Google-generated keys used to encrypt and decrypt your data. By default, Google Compute Engine encrypts all data at rest. Compute Engine handles and manages this encryption for you without any additional actions on your part. However, if you wanted to control and manage this encryption yourself, you can provide your own encryption keys.
Rationaleβ
By default, Google Compute Engine encrypts all data at rest. Compute Engine handles and manages this encryption for you without any additional actions on your part. However, if you wanted to control and manage this encryption yourself, you can provide your own encryption keys.
If you provide your own encryption keys, Compute Engine uses your key to protect the Google-generated keys used to encrypt and decrypt your data. Only users who can provide the correct key can use resources protected by a customer-supplied encryption key.
... see more
Remediationβ
Remediationβ
Currently there is no way to update the encryption of an existing disk. Therefore you should create a new disk with
Encryptionset toCustomer supplied.From Google Cloud Consoleβ
- Go to Compute Engine
Disksby visiting: https://console.cloud.google.com/compute/disks.- Click
CREATE DISK.- Set
Encryption typetoCustomer supplied,- Provide the
Keyin the box.- Select
Wrapped key.- Click
Create.From Google Cloud CLIβ
In the gcloud compute tool, encrypt a disk using the --csek-key-file flag during instance creation. If you are using an RSA-wrapped key, use the gcloud beta component:
gcloud compute instances create <INSTANCE_NAME> --csek-key-file <example-file.json>To encrypt a standalone persistent disk:
gcloud compute disks create <DISK_NAME> --csek-key-file <example-file.json>