Skip to content

Commit ef9194b

Browse files
authored
Merge pull request #44721 from sftim/20240112_revise_encryption_at_rest
Recommend replicating encryption key for API data encryption at rest
2 parents 41e9d2b + 0e05396 commit ef9194b

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

content/en/docs/tasks/administer-cluster/encrypt-data.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -324,6 +324,10 @@ appropriate for your security needs.
324324

325325
### Generate the encryption key {#generate-key-no-kms}
326326

327+
The following steps assume that you are not using KMS, and therefore the steps also
328+
assume that you need to generate an encryption key. If you already have an encryption key,
329+
skip to [Write an encryption configuration file](#write-an-encryption-configuration-file).
330+
327331
{{< caution >}}
328332
Storing the raw encryption key in the EncryptionConfig only moderately improves your security posture,
329333
compared to no encryption.
@@ -375,6 +379,15 @@ Keep the encryption key confidential, including whilst you generate it and
375379
ideally even after you are no longer actively using it.
376380
{{< /note >}}
377381

382+
### Replicate the encryption key
383+
384+
Using a secure mechanism for file transfer, make a copy of that encryption key
385+
available to every other control plane host.
386+
387+
At a minimum, use encryption in transit - for example, secure shell (SSH). For more
388+
security, use asymmetric encryption between hosts, or change the approach you are using
389+
so that you're relying on KMS encryption.
390+
378391
### Write an encryption configuration file
379392

380393
{{< caution >}}

0 commit comments

Comments
 (0)