Disk Encryption
What Is Disk Encryption?
In case your services require encryption for the data stored on disks, EVS provides you with the encryption function. You can encrypt new disks. Keys used by encrypted disks are provided by the Key Management Service (KMS) of Data Encryption Workshop (DEW), which is secure and convenient. Therefore, you do not need to establish and maintain the key management infrastructure.
Keys Used for Disk Encryption
- Default Key: A key that is automatically created by EVS through KMS and named evs/default.
It cannot be disabled and does not support scheduled deletion.
- Custom keys: Keys created by users. You can use existing keys or create new ones to encrypt disks. For details, see in the Data Encryption Workshop User Guide.
Custom Key Status |
Impact |
How to Restore |
---|---|---|
Disabled |
Enable the custom key. For details, see Enabling One or More Custom Keys. |
|
Scheduled deletion |
Cancel the scheduled deletion for the custom key. For details, see Canceling the Scheduled Deletion of One or More Custom Keys. |
|
Deleted |
Data on the disks can never be restored. |
You will be billed for the custom keys you use. If pay-per-use keys are used, ensure that you have sufficient account balance. If yearly/monthly keys are used, renew your order timely. Or, your services may be interrupted and data may never be restored as the encrypted disks become inaccessible.
Relationships Between Encrypted Disks and Backups
The encryption function can be used to encrypt system disks, data disks, and backups. The details are as follows:
- System disk encryption relies on images. For details, see the Image Management Service User Guide.
- The encryption attribute of an existing disk cannot be changed. You can create new disks and determine whether to encrypt the disks or not.
- When a disk is created from a backup, the encryption attribute of the new disk will be consistent with that of the backup's source disk.
Before you use the encryption function, EVS must be granted with the permission to access DEW. If you have the right to grant permissions, grant KMS access rights to EVS directly. If you do not have the permission, contact a user with the security administrator rights to add the security administrator rights for you. Then, grant KMS access rights to EVS. For details, see Who Can Use the Encryption Feature?
For how to create encrypted disks, see Create a Disk.
Who Can Use the Encryption Function?
- The security administrator (having Security Administrator permissions) can grant the KMS access rights to EVS for using the encryption function.
- When a user who does not have the Security Administrator permissions needs to use the encryption function, the condition varies depending on whether the user is the first one ever in the current region to use this function.
- If the user is the first one ever in the current region to use this function, the user must contact a user having the Security Administrator permissions to grant the KMS access rights to EVS. Then, the user can use encryption.
- If the user is not the first one ever in the current region to use this function, the user can use encryption directly.
From the perspective of a tenant, as long as the KMS access rights have been granted to EVS in a region, all the users in the same region can directly use the encryption function.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot