In case your services require encryption for the data stored on EVS disks, EVS provides you with the encryption function. You can encrypt newly created EVS disks.
EVS uses the industry-standard XTS-AES-256 encryption algorithm and keys to encrypt EVS disks. Keys used by encrypted EVS disks are provided by the Key Management Service (KMS), which is secure and convenient. Therefore, you do not need to establish and maintain the key management infrastructure. KMS uses the Hardware Security Module (HSM) that complies with FIPS 140-2 level 3 requirements to protect keys. All user keys are protected by the root key in HSM to prevent key exposure.
The Default Master Key cannot be disabled and does not support scheduled deletion.
CMK Status |
Impact |
How to Restore |
---|---|---|
Disabled |
Enable the CMK. For details, see Managing CMKs > Enabling One or More CMKs in the Key Management Service User Guide. |
|
Scheduled deletion |
Cancel the scheduled deletion for the CMK. For details, see Managing CMKs > Canceling the Scheduled Deletion of One or More CMKs in the Key Management Service User Guide. |
|
Deleted |
Data on the disks can never be restored. |
From the perspective of a tenant, as long as the KMS access rights have been granted to EVS in a region, all the users in the same region can directly use the disk encryption function.
If there are multiple projects in the current region, the KMS access rights need to be granted to each project in this region.
Figure 1 shows the user relationships under regions and projects from the perspective of a tenant. The following example uses region B to describe the two application scenarios of the disk encryption function.
After the KMS access rights have been granted, the system automatically creates a Default Master Key and names it evs/default. DMK can be used for disk encryption.
The EVS disk encryption relies on KMS. When the encryption function is used for the first time ever, the KMS access rights need to be granted to EVS. After the KMS access rights have been granted, all users in this region can use the encryption function, without requiring the KMS access rights to be granted again.
After the security administrator has used the disk encryption function, all users in Region B can directly use the encryption function.
After the KMS access rights have been granted to EVS, User E as well as all users in Region B can directly use the disk encryption function and do not need to contact the security administrator to grant the KMS access rights to EVS again.