Skip to content

Commit 0e05396

Browse files
author
Tim Bannister
committed
Recommend replicating encryption key
When using API encryption at rest without KMS, the same encryption key must be securely replicated to all the hosts that run a kube-apiserver. Document that.
1 parent daf627d commit 0e05396

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

content/en/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -324,6 +324,10 @@ appropriate for your security needs.
324324

325325
### Generate the encryption key {#generate-key-no-kms}
326326

327+
The following steps assume that you are not using KMS, and therefore the steps also
328+
assume that you need to generate an encryption key. If you already have an encryption key,
329+
skip to [Write an encryption configuration file](#write-an-encryption-configuration-file).
330+
327331
{{< caution >}}
328332
Storing the raw encryption key in the EncryptionConfig only moderately improves your security posture,
329333
compared to no encryption.
@@ -375,6 +379,15 @@ Keep the encryption key confidential, including whilst you generate it and
375379
ideally even after you are no longer actively using it.
376380
{{< /note >}}
377381

382+
### Replicate the encryption key
383+
384+
Using a secure mechanism for file transfer, make a copy of that encryption key
385+
available to every other control plane host.
386+
387+
At a minimum, use encryption in transit - for example, secure shell (SSH). For more
388+
security, use asymmetric encryption between hosts, or change the approach you are using
389+
so that you're relying on KMS encryption.
390+
378391
### Write an encryption configuration file
379392

380393
{{< caution >}}

0 commit comments

Comments
 (0)