Ensure that your Google Cloud Secret Manager secrets are encrypted using Cloud KMS Customer-Managed Encryption Keys (CMEKs) in order to have a more granular control over your secret data encryption process and meet compliance requirements.
A Secret Manager secret is a wrapper around a collection of secret data versions. By default, secrets stored in Secret Manager are encrypted with Google-managed encryption keys. The Secret Manager service manages this type of encryption without any additional actions from you and your cloud application. However, if you want to fully control and manage Google Cloud secret encryption yourself, you can use your own Customer-Managed Encryption Key (CMEK). To create and manage your own Customer-Managed Encryption Keys use Cloud Key Management Service (Cloud KMS). Cloud KMS provides secure and efficient encryption key management, controlled key rotation, and revocation mechanisms.
As an example, this rule demonstrates how to implement Customer-Managed Encryption Keys (CMEKs) for Secret Manager secrets that are configured via an automatic replication policy.
Audit
To determine if your Secret Manager secrets are encrypted using Customer-Managed Encryption Keys, perform the following operations:
Remediation / Resolution
To enable encryption with Cloud KMS Customer-Managed Encryption Keys (CMEKs) for your Secret Manager secrets, perform the following operations:
Updating the CMEK configuration only applies to new secret versions. Existing secret versions are not re-encrypted.References
- Google Cloud Platform (GCP) Documentation
- Enable customer-managed encryption keys for Secret Manager
- List secrets and view secret details
- View secret version details