Skip to main content

πŸ’Ό 8.1 Ensure that Dataproc Cluster is encrypted using Customer-Managed Encryption Key - Level 2 (Automated)

  • Contextual name: πŸ’Ό 8.1 Ensure that Dataproc Cluster is encrypted using Customer-Managed Encryption Key - Level 2 (Automated)
  • ID: /frameworks/cis-gcp-v3.0.0/08/01
  • Located in: πŸ’Ό 8 Dataproc

Description​

When you use Dataproc, cluster and job data is stored on Persistent Disks (PDs) associated with the Compute Engine VMs in your cluster and in a Cloud Storage staging bucket. This PD and bucket data is encrypted using a Google-generated data encryption key (DEK) and key encryption key (KEK). The CMEK feature allows you to create, use, and revoke the key encryption key (KEK). Google still controls the data encryption key (DEK).

Similar​

  • Sections
    • /frameworks/cis-gcp-v2.0.0/01/17
  • Internal
    • ID: dec-c-60d4e8f3

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS GCP v2.0.0 β†’ πŸ’Ό 1.17 Ensure that Dataproc Cluster is encrypted using Customer-Managed Encryption Key - Level 2 (Automated)1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό CIS GCP v2.0.0 β†’ πŸ’Ό 1.17 Ensure that Dataproc Cluster is encrypted using Customer-Managed Encryption Key - Level 2 (Automated)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ Google Dataproc Cluster is not encrypted using Customer-Managed Encryption Key 🟒1🟒 x6