Ensure that the data managed by Google Cloud Document AI processors is encrypted with a Customer-Managed Encryption Key (CMEK) instead of a Google-managed encryption key. When you enable encryption at rest with CMEK for an Document AI processor in your Google Cloud Platform (GCP) project, all documents managed by the AI processor are fully encrypted with the CMEK. Customer-Managed Encryption Keys provide greater control over the encryption and decryption process, helping you meet stringent compliance requirements.
By default, Google Cloud Platform (GCP) encrypts all data using Google-managed encryption keys. This type of encryption is handled by GCP without any additional effort from you or your application. However, if you prefer to have full control over data encryption, you can use your own Customer-Managed Encryption Key (CMEK). To create and manage your own CMEKs, utilize Cloud Key Management Service (Cloud KMS). Cloud KMS offers secure and efficient encryption key management, including controlled key rotation and revocation mechanisms.
Audit
To determine if your Google Cloud Document AI processors are protected with Customer-Managed Encryption Keys (CMEKs), perform the following operations:
Checking Document AI processors for encryption with Customer-Managed Encryption Key (CMEK) using GCP Command Line Interface (CLI) is not currently supported.Remediation / Resolution
Encryption with Customer-Managed Encryption Keys (CMEKs) is only available during processor creation. To enable encryption with CMEK for your new Google Cloud Document AI processors, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Document AI overview
- Document AI security and compliance
- Customer-managed encryption keys (CMEK)
- Creating and managing processors