Ensure that your Google Cloud Storage data is encrypted at rest using Customer-Managed Keys (CMKs) in order to have full control over your data encryption/decryption process. You can create, rotate, manage and destroy your own Customer-Managed Keys (CMKs) with the Cloud Key Management Service (Cloud KMS).
By default, Google Cloud Storage service encrypts all data (objects) within your buckets using Google-managed encryption keys. However, if you want to fully control and manage bucket data encryption yourself, you can use your own Customer-Managed Keys (CMKs). Cloud KMS Customer-Managed Keys provide an additional encryption layer for your sensitive and confidential data, and are often used in organizations where compliance and security controls are more stringent.
Audit
To determine if your Cloud Storage buckets are configured to encrypt data using Customer-Managed Keys (CMKs), perform the following actions:
Remediation / Resolution
To enable encryption at rest using Cloud KMS Customer-Managed Keys (CMKs) for the data (objects) available in your Cloud Storage buckets, perform the following actions:
References
- Google Cloud Platform (GCP) Documentation
- ENCRYPTION AT REST
- Customer-managed encryption keys
- Using customer-managed encryption keys
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud kms keyrings create
- gcloud kms keys create
- gcloud projects add-iam-policy-binding
- GSutil Documentation
- gsutil tool
- ls - List providers, buckets, or objects
- kms - Configure Cloud KMS encryption