Skip to content

Commit

Permalink
WIP CMEK tutorials
Browse files Browse the repository at this point in the history
  • Loading branch information
Michael Trestman committed Jun 9, 2022
1 parent c386d97 commit 9e7ae21
Showing 1 changed file with 12 additions and 2 deletions.
14 changes: 12 additions & 2 deletions cockroachcloud/managing-cmek.md
Original file line number Diff line number Diff line change
Expand Up @@ -104,9 +104,19 @@ This can be done temporarily or permanently. This action is performed at the lev

### Step 1: Revoke IAM access

Revoke CMEK for a cluster by revoking {{ site.data.products.db }}'s access to your key at the IAM level with your infrastructure provider. This will immediately prevent all access to your data, but can be reversed by reauthorizing access to the key.
{{site.data.alerts.callout_danger}}
Do not delete the CMEK key.
Deleting the CMEK key will permanently prevent decryption of your data, preventing all possible access and rendering the data inaccessible.
{{site.data.alerts.end}}

First, revoke Cockroach Labs' access to your key at the IAM level with your infrastructure provider.

This will **not** immediately stop your cluster from encrypting and decrypting data, which does not take effect until you update your cluster in the next step.

That is because CockroachDB does not use your CMEK key to encrypt/decrypt data, but only to encrypt/decrypt a key encryption key (KEK). The KEK is used to encrypt a data encryption key (DEK), which is used to encrypt/decrypt your application data.

Your cluster will continue to use the already-provisioned DEK until you make the Cloud API call to revoke CMEK.

Deleting the key will permanently prevent decryption of your data, preventing all possible access and rendering the database unusable and data inaccessible.


### Step 2: Update your cluster to stop using the CMEK key for encryption
Expand Down

0 comments on commit 9e7ae21

Please sign in to comment.