Ensure that your Oracle Cloud Infrastructure (OCI) Lustre file systems are encrypted with Customer-Managed Keys (CMKs) instead of Oracle-managed keys (i.e. default keys used by OCI for encryption at rest) in order to have a more granular control over your data encryption and decryption process.
In Oracle Cloud Infrastructure (OCI), encryption at rest protects your Lustre file systems and assists in fulfilling your organization's security and compliance requirements. By default, the File Storage with Lustre service encrypts all file system data at rest by using the Advanced Encryption Standard (AES) algorithm with 256-bit keys. The encryption process uses Oracle-managed keys, also known as service-managed keys. However, to meet stringent regulatory standards, you can bring your own keys (i.e. Customer-Managed Keys) in order to fully control who can use the encryption keys and access the encrypted data.
Audit
To determine if your Oracle Cloud Infrastructure (OCI) Lustre file systems are encrypted using Customer-Managed Keys (CMKs), perform the following operations:
Remediation / Resolution
To enable encryption at rest for your Oracle Cloud Infrastructure (OCI) Lustre file systems using Customer-Managed Keys (CMKs), perform the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Protect Data at Rest
- Overview of File Storage with Lustre
- Managing File Storage with Lustre File Systems
- Getting a File System's Details
- Overview of Vaults, Key Management, and Secret Management
- Creating a Vault
- Creating a Master Encryption Key
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- list-lustre-file-systems
- lustre-file-system get
- lustre-file-system update
- vault create
- vault get
- key create