-
Notifications
You must be signed in to change notification settings - Fork 3
Encryption
Igor Lysak edited this page Sep 28, 2022
·
5 revisions
Protecting hub.yaml.elaborate
and hub.yaml.state
files is critical to maintaining stack security. Written to remote storage such as AWS S3, GCP, or Azure Storage, the files are encrypted with AES-256 in GCM. The data keys currently come from one of the following implementations:
- PBKDF2 key derivation function controlled by
HUB_CRYPTO_PASSWORD
environment variable. Set value to<random-password>
. - AWS KMS data key referenced by
HUB_CRYPTO_AWS_KMS_KEY_ARN
. Set toarn:aws:kms:<region>:<account-no>:alias/<key-alias>
. - Azure Key Vault key referenced by
HUB_CRYPTO_AZURE_KEYVAULT_KEY_ID
. Set tohttps://<my-kv>.vault.azure.net/keys/<my-key>/<key-version>
. - GCP KMS keyring key name referenced by
HUB_CRYPTO_GCP_KMS_KEY_NAME
. Set toprojects/<project>/locations/<location>/keyRings/<keyring>/cryptoKeys/<key>
.
In case you're using Mozilla SOPS, then cloud KMS keys are the same as for SOPS_KMS_ARN
, SOPS_AZURE_KEYVAULT_URLS
, or SOPS_GCP_KMS_IDS
.
© 2022 EPAM Systems, Inc. All Rights Reserved