π‘οΈ Oracle IAAS Block Volume is not encrypted with a customer managed keyπ’
- Contextual name: π‘οΈ IAAS Block Volume is not encrypted with a customer managed keyπ’
- ID:
/ce/ca/oracle/compute/block-volume-cmk-encryption - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Internal:
dec-x-ae60c87e
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-ae60c87e | 1 |
Descriptionβ
Descriptionβ
This policy identifies Oracle IAAS Block Volumes that are not encrypted with a customer managed key from OCI Vault.
Rationaleβ
Oracle Block Volume encrypts volume data at rest by default. Using a customer managed key adds stronger governance over the encryption key that protects block volume data. It allows the organization to manage key access, rotation, audit visibility, and revocation independently from the storage service.
Customer managed keys are recommended for block volumes that store sensitive, regulated, or business-critical data because they support stricter separation of duties and key lifecycle controls than provider-managed encryption keys.
Impactβ
Changing the encryption key affects how the volume is protected and can impact workloads that depend on the volume. Before remediation, confirm that the target Vault key is enabled, available in the required region, and grants the Block Volume service the permissions needed to use it. Disabling, deleting, or restricting the key can prevent access to encrypted volume data.
... see more
Remediationβ
Remediationβ
Encrypt the Block Volume with a Customer Managed Keyβ
Configure the affected block volume to use a customer managed key from OCI Vault. Before applying the change, confirm that the target key is enabled and that the Block Volume service has permission to use it.
From Oracle Cloud Consoleβ
- Follow the audit procedure in the policy description to identify affected block volumes.
- For each affected block volume, click the link under
Display name.- If
Encryption Keyis set toOracle-managed key, clickAssignnext toOracle-managed key.- Select the target Vault compartment and Vault.
- Select the target master encryption key compartment and master encryption key.
- Click
Assign.- Confirm that
Encryption Keyshows the intended customer managed key.From OCI CLIβ
Assign a customer managed key to the existing block volume:
oci bv volume-kms-key update \
--volume-id {{volume-ocid}} \
--kms-key-id {{kms-key-ocid}}When creating a new block volume, specify the customer managed key at creation:
... see more