π Google Dataproc Cluster is not encrypted using Customer-Managed Encryption Key π’
- Contextual name: π Cluster is not encrypted using Customer-Managed Encryption Key π’
- ID:
/ce/ca/google/dataproc/cluster-encryption
- Located in: π Google Dataproc
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
When you use Dataproc, cluster and job data is stored on Persistent Disks (PDs) associated with the Compute Engine VMs in your cluster and in a Cloud Storage staging bucket. This PD and bucket data is encrypted using a Google-generated data encryption key (DEK) and key encryption key (KEK). The CMEK feature allows you to create, use, and revoke the key encryption key (KEK). Google still controls the data encryption key (DEK).
Rationaleβ
Cloud services offer the ability to protect data related to those services using encryption keys managed by the customer within Cloud KMS. These encryption keys are called customer-managed encryption keys (CMEK). When you protect data in Google Cloud services with CMEK, the CMEK key is within your control.
Impactβ
Using Customer Managed Keys involves additional overhead in maintenance by administrators.
Auditβ
From Google Cloud Consoleβ
- Login to the GCP Console and navigate to the Dataproc Cluster page by visiting https://console.cloud.google.com/dataproc/clusters.
... see more
Remediationβ
Remediationβ
From Google Cloud Consoleβ
Login to the GCP Console and navigate to the Dataproc Cluster page by visiting https://console.cloud.google.com/dataproc/clusters.
Select the project from the projects dropdown list.
On the
Dataproc Cluster
page, click on theCreate Cluster
to create a new cluster with Customer managed encryption keys.On
Create a cluster
page, perform below steps:β’ Inside
Set up cluster
section perform below steps:o In the `Name` textbox, provide a name for your cluster.
o From `Location` select the location in which you want to deploy a cluster.
o Configure other configurations as per your requirements.β’ Inside
Configure Nodes
andCustomize cluster
section configure the settings as per your requirements.β’ Inside
Manage security
section, perform below steps:o From `Encryption`, select `Customer-managed key`.
o Select a customer-managed key from dropdown list.
o Ensure that the selected KMS Key have Cloud KMS CryptoKey Encrypter/Decrypter role assign to Dataproc Cluster service account ("serviceAccount:service-<project_number>@compute-system.iam.gserviceaccount.com").... see more
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS GCP v3.0.0 β πΌ 8.1 Ensure that Dataproc Cluster is encrypted using Customer-Managed Encryption Key - Level 2 (Automated) | 1 | |||
πΌ Cloudaware Framework β πΌ Secure Access | 43 |