Ensure that the data sent through an Eventarc pipeline (also known as Eventarc Advanced pipeline) is encrypted with a Customer-Managed Encryption Key (CMEK) instead of a Google-managed encryption key. When you enable encryption with CMEK for an Eventarc pipeline in your Google Cloud Platform (GCP) project, all messages that pass through the pipeline are fully encrypted with the CMEK. Customer-Managed Encryption Keys provide greater control over the encryption and decryption process, helping you meet stringent compliance requirements.
By default, Google Cloud Platform (GCP) encrypts all data using Google-managed encryption keys. This type of encryption is handled by GCP without any additional effort from you or your application. However, if you prefer to have full control over data encryption, you can use your own Customer-Managed Encryption Key (CMEK). To create and manage your own CMEKs, utilize Cloud Key Management Service (Cloud KMS). Cloud KMS offers secure and efficient encryption key management, including controlled key rotation and revocation mechanisms.
Audit
To determine if your Google Cloud Eventarc pipelines are protected with Customer-Managed Encryption Keys (CMEKs), perform the following operations:
Remediation / Resolution
To enable encryption with Customer-Managed Encryption Keys (CMEKs) for your Eventarc message pipeline, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Use customer-managed encryption keys (CMEK)
- Use customer-managed encryption keys