Configure CMEK in GCP¶
Privacera supports Customer Managed Encryption Keys (CMEK) for encrypting data at rest in GCP Storage Buckets and Pub/Sub Topics. This section provides steps to configure CMEK in Kubernetes for GCP.
Prerequisites¶
- Discovery is installed and running.
- CMEK keys
- CMEK keys for GCS and Pub/Sub (optional)
Note
- Ensure that the specified CMEK keys exist and are accessible to the Privacera components running in the GCP environment.
- The CMEK format for GCP should follow this pattern:
projects/<project>/locations/<location>/keyRings/<keyRing>/cryptoKeys/<cryptoKey>.
Setup¶
Go to the Privacera Manager host and navigate to the Privacera Manager installation directory:
| Bash | |
|---|---|
Add or update the following variables:
Custom CMEK Keys for GCS & Pub/Sub¶
This step is optional
By default, Discovery uses K8S_PV_KEY to encrypt data at rest in GCP Storage Buckets and Pub/Sub Topics. If you want to use different keys for these services, modify the vars.discovery.gcp.yml file:
Copy the vars.discovery.gcp.yml file from the sample variables directory to your custom variables directory:
| Bash | |
|---|---|
Add or update the following variables:
| Bash | |
|---|---|
Restart Privacera Services¶
- Prev Advanced Configuration
- Next Troubleshooting