Story image

Google tells its cloud customers: BYO encryption keys

11 Aug 15

Google has added Customer-Supplied Encryption Keys for Google Compute Engine in beta, which provides users control over encryption in the public cloud.

Google Compute Engine already protects all customer data with industry-standard AES-256 bit encryption. Customer-Supplied Encryption Keys marries the hardened encryption framework built into Google’s infrastructure with encryption keys that are owned and controlled exclusively by users, says Leonard Law, Google product manager.

“You create and hold the keys, you determine when data is active or at rest, and absolutely no one inside or outside Google can access your at rest data without possession of your keys.

“Google does not retain your keys, and only holds them transiently in order to fulfil your request,” Law says.

Now available in beta in select countries, users can access Customer-Supplied Encryption Keys through Google’s API, Developers Console, and gcloud, the company’s command-line interface.

This new functionality is currently rolling out to the Free Trial and will be available soon, Law says.

Law highlights a few key features of the Customer-Supplied Encryption Keys:

Security: All of a user’s compute assets are encrypted using the industry-leading AES-256 standard, and Google never retains a user’s keys, meaning Google cannot decrypt data at rest.

Comprehensive: Unlike many solutions, Customer-Supplied Encryption Keys cover all forms of data at rest for Compute Engine, including boot and data persistent disks.

Fast: Google Compute Engine is already encrypting user’s data at rest, and Customer-Supplied Encryption Keys gives the user greater control, without additional overhead.

Included Free: Google says encryption should be enabled by default for cloud services and is therefore not going to charge more for the option to bring your own keys.

Security is as much about control as it is about data protection, says Law.

“With Customer-Supplied Encryption Keys, we are giving you control over how your data is encrypted with Google Compute Engine.

“Keep in mind, though, if you lose your encryption keys, we won’t be able to help you recover your keys or your data - with great power comes great responsibility!” he says.

What MSPs can learn from Datto’s Channel Ransomware Report
While there have been less high profile attacks making the headlines, the frequency of attacks is, in fact, increasing.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.