๐ก๏ธ Oracle IAAS Boot Volume is not encrypted with a customer managed key๐ข
- Contextual name: ๐ก๏ธ IAAS Boot volume is not encrypted with a customer managed key๐ข
- ID:
/ce/ca/oracle/compute/boot-volume-cmk-encryption - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Descriptionโ
Descriptionโ
This policy identifies Oracle IAAS Boot Volumes that are not encrypted with a customer managed key from OCI Vault.
Rationaleโ
OCI boot volumes store the operating system, boot files, and other data required to start compute instances. Oracle encrypts boot volumes at rest by default, but using a customer managed key provides stronger governance over the encryption key that protects this data. It allows the organization to manage key access, rotation, audit visibility, and revocation independently from the storage service.
Customer managed keys are recommended for boot volumes that support sensitive, regulated, or business-critical workloads because they enable stricter separation of duties and better control of the key lifecycle than provider-managed encryption keys.
Impactโ
Using customer managed keys increases operational responsibility. Before remediation, confirm that the target Vault key is enabled, available in the required region, and grants the Compute and Block Volume services permission to use it. Disabling, deleting, or restricting the key can prevent access to protected boot volumes.
... see more
Remediationโ
Remediationโ
Encrypt the Boot Volume with a Customer Managed Keyโ
Configure the affected boot volume to use a customer managed key from OCI Vault. Before applying the change, confirm that the target key is enabled and that the Compute and Block Volume services have permission to use it.
From Oracle Cloud Consoleโ
- Follow the audit procedure above.
- For each boot volume in the returned results, click the boot volume name.
- Click
Assignnext toEncryption Key.- Select the
Vault CompartmentandVault.- Select the
Master Encryption Key CompartmentandMaster Encryption Key.- Click
Assign.From OCI CLIโ
For each affected boot volume, assign the target Vault key:
oci bv boot-volume update \
--boot-volume-id {{boot-volume-ocid}} \
--kms-key-id {{kms-key-ocid}}After remediation, verify that the boot volume references the intended customer managed key:
oci bv boot-volume get \
--boot-volume-id {{boot-volume-ocid}} \
--query "data.\"kms-key-id\""
policy.yamlโ
Linked Framework Sectionsโ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| ๐ผ CIS Oracle v3.1.0 โ ๐ผ 5.2.2 Ensure boot volumes are encrypted with Customer Managed Key (CMK). - Level 2 (Automated) | 1 | no data | |||
| ๐ผ Cloudaware Framework โ ๐ผ Data Encryption | 65 | no data |