π‘οΈ Oracle Storage Bucket is not encrypted with a customer managed keyπ’
- Contextual name: π‘οΈ Storage Bucket is not encrypted with a customer managed keyπ’
- ID:
/ce/ca/oracle/bucket/bucket-cmk-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Internal:
dec-x-6664ebac
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-6664ebac | 1 |
Descriptionβ
Descriptionβ
This policy identifies Oracle Storage Buckets that are not encrypted with a customer managed key from OCI Vault.
Rationaleβ
Oracle Object Storage encrypts bucket data at rest by default. Using a customer managed key adds stronger governance over the encryption key that protects bucket objects. It allows the organization to manage key access, rotation, audit visibility, and revocation independently from the storage service.
Customer managed keys are recommended for buckets that store sensitive, regulated, or business-critical data because they support stricter separation of duties and key lifecycle controls than provider-managed encryption keys.
Impactβ
Changing the encryption key affects how new and updated objects are encrypted. Before remediation, confirm that the target Vault key is enabled, available in the required region, and grants Object Storage the permissions needed to use the key. Disabling, deleting, or restricting the key can prevent access to encrypted objects.
Auditβ
This policy flags an Oracle Storage Bucket as
INCOMPLIANTwhenKMS Key OCIDis empty.... see more
Remediationβ
Remediationβ
Encrypt the Bucket with a Customer Managed Keyβ
Configure the affected Object Storage bucket to use a customer managed key from OCI Vault. Before applying the change, confirm that the target key is enabled and that Object Storage has permission to use it.
From Oracle Cloud Consoleβ
- Navigate to
https://cloud.oracle.com/object-storage/buckets.- Click the affected bucket under the
Nameheading.- Click
Assignnext toEncryption Key: Oracle managed key.- Select the target Vault.
- Select the target master encryption key.
- Click
Assign.From OCI CLIβ
For each affected bucket, run:
oci os bucket update \
--namespace-name {{namespace-name}} \
--bucket-name {{bucket-name}} \
--kms-key-id {{kms-key-ocid}}After remediation, verify that the bucket references the intended customer managed key:
oci os bucket get \
--namespace-name {{namespace-name}} \
--bucket-name {{bucket-name}} \
--query "data.\"kms-key-id\""