Customer supplied encryption keys are not used to encrypt compute disk Affecting Compute Engine service in Google
Severity Framework
Snyk CCSS
Rule category
Data / Encryption at Rest
Is your enviroment affected by this misconfiguration?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsFrameworks
CIS-Google
CSA-CCM
GDPR
HIPAA
ISO-27001
NIST-800-53
SOC-2
- Snyk ID SNYK-CC-00375
- credit Snyk Research Team
Description
Google Cloud encrypts all data at rest by default with Google-generated keys. However, for business critical instances, users may want to use customer-supplied encryption keys for an additional layer of protection as data encrypted with customer-supplied encryption keys cannot be accessed by Google.
How to fix?
Set the disk_encryption_key.raw_key
attribute to a customer-supplied encryption key.
Example Configuration
resource "google_compute_disk" "allow" {
name = "test-disk"
type = "pd-ssd"
zone = "us-central1-a"
image = "debian-10-buster-v20220920"
labels = {
environment = "dev"
}
physical_block_size_bytes = 4096
disk_encryption_key {
raw_key = "dummy_key"
}
}