Ensure that the data related to Eventarc bus (also known as Eventarc Advanced bus) is encrypted with a Customer-Managed Encryption Key (CMEK) instead of a Google-managed encryption key. When you enable encryption with CMEK for an Eventarc bus in your Google Cloud Platform (GCP) project, all messages that pass through the Eventarc bus are fully encrypted with the CMEK. Customer-Managed Encryption Keys provide greater control over the encryption and decryption process, helping you meet stringent compliance requirements.
By default, Google Cloud Platform (GCP) encrypts all data using Google-managed encryption keys. This type of encryption is handled by GCP without any additional effort from you or your application. However, if you prefer to have full control over data encryption, you can use your own Customer-Managed Encryption Key (CMEK). To create and manage your own CMEKs, utilize Cloud Key Management Service (Cloud KMS). Cloud KMS offers secure and efficient encryption key management, including controlled key rotation and revocation mechanisms.
Audit
To determine if your Google Cloud Eventarc bus is protected with a Customer-Managed Encryption Key (CMEK), perform the following operations:
Remediation / Resolution
To enable encryption with Customer-Managed Encryption Keys (CMEKs) for your Eventarc message buses, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Use customer-managed encryption keys (CMEK)
- Use customer-managed encryption keys