BigQuery data sets should specify a default customer-managed encryption key

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Description

By default, BigQuery uses envelope encryption with Google-managed cryptographic keys to encrypt the data at rest. The data is encrypted using data encryption keys, and the data encryption keys themselves are further encrypted using key encryption keys. This is seamless and does not require any additional input from the user. For greater control, customer-managed encryption keys (CMEKs) can be used as an encryption key management solution for BigQuery datasets.

Default Value

Google-managed keys are used as key encryption keys.

Rationale

By default, BigQuery uses envelope encryption with Google-managed cryptographic keys to encrypt the data at rest. The data is encrypted using data encryption keys, and the data encryption keys themselves are further encrypted using key encryption keys. This is seamless and does not require any additional input from the user.

For greater control, CMEKs can be used as an encryption key management solution for BigQuery datasets. Setting a default CMEK for a dataset ensures that any tables created in the future will use the specified CMEK, if no others are provided.

Impact

Using CMEKs incurs an additional labor-hour investment to create, protect, and manage the keys.

Note: Google does not store your keys on its servers and cannot access your protected data unless you provide the key. This also means that if you forget or lose your key, there is no way for Google to recover the key or to recover any data encrypted with the lost key.

Remediation

To update the default CMEK for existing data sets, specify the default key in the EncryptionConfiguration.kmsKeyName field when calling the datasets.insert or datasets.patch methods.

References

  1. https://cloud.google.com/bigquery/docs/customer-managed-encryption