Por padrão, o Application Integration criptografa o conteúdo do cliente em
repouso. A Application Integration processa a criptografia para você sem que você precise
fazer nada. Essa opção é chamada de Criptografia padrão do Google.
Se você quiser controlar suas chaves de criptografia, use chaves de criptografia gerenciadas pelo cliente
(CMEKs) no Cloud KMS com serviços integrados a CMEKs, incluindo
o Application Integration. O uso de chaves do Cloud KMS permite controlar o nível de proteção,
o local, a programação de rotação, as permissões de uso e acesso e os limites criptográficos.
O uso do Cloud KMS também permite
visualizar registros de auditoria e controlar ciclos de vida importantes.
Em vez de o Google ser proprietário e gerente
de chaves de criptografia de chaves (KEKs) simétricas que protegem seus dados, você controla e
gerencia essas chaves no Cloud KMS.
Depois de configurar os recursos com CMEKs, a experiência de acesso aos recursos do
Application Integration é semelhante à criptografia padrão do Google.
Para mais informações sobre suas opções de criptografia,
consulte Chaves de criptografia gerenciadas pelo cliente (CMEK).
Antes de começar
Verifique se as seguintes tarefas foram concluídas antes de usar a CMEK para Application Integration:
Ative a API Cloud KMS para o projeto que armazenará as chaves de criptografia.
Conceda o seguinte papel do IAM na chave CMEK à conta de serviço padrão do Application Integration no projeto compartilhado ou de hospedagem de chaves:
Atribua o papel do IAM Administrador do Cloud KMS às pessoas que gerenciam as chaves da CMEK. Além disso, conceda as seguintes permissões do IAM ao projeto que armazena as chaves de criptografia:
A página Regiões aparece, listando as regiões provisionadas para o Application Integration.
Na integração atual que você quer usar a CMEK, clique em more_vertAções e selecione Editar criptografia.
No painel "Editar criptografia", expanda a seção Configurações avançadas.
Selecione Usar uma chave de criptografia gerenciada pelo cliente (CMEK) e faça o seguinte:
Selecione uma chave de CMEK na lista suspensa disponível. As chaves CMEK listadas no menu suspenso são baseadas na região provisionada. Para criar uma chave, consulte Criar uma chave CMEK.
Clique em Verificar para conferir se a conta de serviço padrão tem acesso à chave criptográfica da chave de CMEK selecionada.
Quando você usa a CMEK no Application Integration,
seus projetos podem consumir cotas de solicitações criptográficas
do Cloud KMS. Por exemplo, as chaves da CMEK podem consumir essas cotas em cada chamada de criptografia e descriptografia.
As operações de criptografia e descriptografia
com chaves CMEK afetam as cotas do Cloud KMS destas maneiras:
Para chaves CMEK de software geradas no Cloud KMS, nenhuma
cota do Cloud KMS é consumida.
Para chaves CMEK de hardware, às vezes chamadas de chaves do
Cloud HSM, as operações de criptografia e descriptografia são descontadas das
cotas do Cloud HSM no projeto que
contém a chave.
Para chaves CMEK externas, às vezes chamadas de chaves
do Cloud EKM, as operações de criptografia e descriptografia são descontadas das
cotas do Cloud EKM no projeto que
contém a chave.
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-08-25 UTC."],[[["\u003cp\u003eApplication Integration uses customer-managed encryption keys (CMEK) to allow users control over data encryption for compliance or regulatory needs, alongside the default Google-managed encryption.\u003c/p\u003e\n"],["\u003cp\u003eTo use CMEK, the Cloud KMS API must be enabled, the user must have the necessary IAM roles like Cloud KMS Admin, and a key ring with a key must be created in the same region as the Application Integration setup.\u003c/p\u003e\n"],["\u003cp\u003eThe default service account needs the Cloud KMS CryptoKey Encrypter/Decrypter role assigned to access the CMEK key, and verification must be done before using the key.\u003c/p\u003e\n"],["\u003cp\u003eEnabling CMEK encryption for an Application Integration region is a permanent action that cannot be reversed, and the chosen method of encryption for a region cannot be changed once set.\u003c/p\u003e\n"],["\u003cp\u003eUsing CMEK keys affects Cloud KMS quotas, with software keys not consuming quota, while hardware (HSM) and external (EKM) keys consume specific Cloud HSM and Cloud EKM quotas respectively, within the project where the keys are stored.\u003c/p\u003e\n"]]],[],null,["# Customer-managed encryption keys\n\nSee the [supported connectors](/integration-connectors/docs/connector-reference-overview) for Application Integration.\n\nCustomer-managed encryption keys\n================================\n\nBy default, Application Integration encrypts customer content at\nrest. Application Integration handles encryption for you without any\nadditional actions on your part. This option is called *Google default encryption*.\n\nIf you want to control your encryption keys, then you can use customer-managed encryption keys\n(CMEKs) in [Cloud KMS](/kms/docs) with CMEK-integrated services including\nApplication Integration. Using Cloud KMS keys gives you control over their protection\nlevel, location, rotation schedule, usage and access permissions, and cryptographic boundaries.\nUsing Cloud KMS also lets\nyou view audit logs and control key lifecycles.\n\nInstead of Google owning and managing the symmetric\n[key encryption keys (KEKs)](/kms/docs/envelope-encryption#key_encryption_keys) that protect your data, you control and\nmanage these keys in Cloud KMS.\n\nAfter you set up your resources with CMEKs, the experience of accessing your\nApplication Integration resources is similar to using Google default encryption.\nFor more information about your encryption\noptions, see [Customer-managed encryption keys (CMEK)](/kms/docs/cmek).\n| **Tip:** When you use Google-owned and Google-managed encryption keys in Application Integration, your tenant projects consumes Cloud KMS cryptographic requests quotas. For more information about the quotas and limits, see [Cloud KMS quotas](/kms/quotas).\n\nBefore you begin\n----------------\n\nEnsure that the following tasks are completed before using CMEK for Application Integration:\n\n1. Enable the Cloud KMS API for the project that will store your encryption keys.\n [Enable Cloud KMS API](https://console.cloud.google.com/flows/enableapi?apiid=cloudkms.googleapis.com)\n\n | **Tip:** You can run Application Integration and Cloud Key Management Service in the same Google Cloud project, or in different projects.\n - If you use CMEK in a different project (shared or key-hosting project) than the one where you have set up Application Integration:\n 1. Enable the following API in the shared or key-hosting project:\n - [Cloud Key Management Service API](https://console.cloud.google.com/apis/library/cloudkms.googleapis.com)\n 2. Grant the following IAM role on the CMEK key to the Application Integration [default service account](/application-integration/docs/access-control-iam#sa) in the shared or key-hosting project:\n - [Cloud KMS CryptoKey Encrypter/Decrypter](/iam/docs/understanding-roles#cloud-kms-roles)\n\n | **Note:** To enable role assignment for the default service account, you must [verify the CMEK key](#enable-cmek) at least once, even if the first attempt fails.\n2. Assign the **Cloud KMS Admin** IAM role to the individuals managing the CMEK keys. Additionally, grant the following IAM permissions for the project that stores your encryption keys:\n - `cloudkms.cryptoKeys.setIamPolicy`\n - `cloudkms.keyRings.create`\n - `cloudkms.cryptoKeys.create`\n - `cloudkms.cryptoKeyVersions.useToEncrypt`\n\n | **Caution:**The Cloud KMS Admin role contains permissions for key maintenance and key version destruction. To protect your Cloud KMS resources, this role should only be assigned to individuals responsible for key administration.\n\n For information about granting additional roles or permissions, see [Granting, changing, and revoking access](/iam/docs/granting-changing-revoking-access).\n3. Create a [key ring](/kms/docs/creating-keys#create_a_key_ring) and a [key](/kms/docs/creating-keys#create_a_key). **Note:**The key ring and CMEK key must be created in the same region where you have set up Application Integration.\n\nAdd service account to CMEK key\n-------------------------------\n\n\nIn order to use a CMEK key in Application Integration, you must ensure that your [default service account](/application-integration/docs/access-control-iam#sa) is added and assigned with the [CryptoKey Encrypter/Decrypter](/iam/docs/understanding-roles#cloud-kms-roles) IAM role for that CMEK key.\n\n1. In the Google Cloud console, go to the **Key Inventory** page.\n\n\n [Go to Key Inventory page](https://console.cloud.google.com/security/kms/keys)\n2. Select the checkbox for the desired CMEK key. The **Permissions** tab in the right window pane becomes available.\n\n3. Click **Add principal**, and enter the email address of the default service account.\n4. Click **Select a role** and select the **Cloud KMS CryptoKey Encrypter/Decrypter** role from the available dropdown list.\n5. Click **Save**.\n\nEnable CMEK encryption for an Application Integration region\n------------------------------------------------------------\n\nCMEK can be used to encrypt and decrypt [data stored](/application-integration/docs/encryption#data) on PDs within the scope of the provisioned region.\n| **Caution:**Enabling CMEK encryption for an Application Integration region cannot be undone. This also means that you can't change the encryption method for a region if CMEK is already enabled.\nTo enable CMEK encryption for an Application Integration region in your Google Cloud project, perform the following steps:\n\n1. In the Google Cloud console, go to the **Application Integration** page.\n\n\n [Go to Application Integration](https://console.cloud.google.com/integrations)\n2. In the navigation menu, click **Regions** .\n\n The **Regions** page appears, listing the provisioned regions for Application Integration.\n3. For the existing integration that you want to use CMEK, click more_vert **Actions** and select **Edit encryption**.\n4. In the **Edit encryption pane** , expand the **Advanced settings** section.\n5. Select **Use a Customer-managed encryption key (CMEK)** , and do the following:\n 1. Select a CMEK key from the available drop-down list. The CMEK keys listed in the drop-down are based on the provisioned region. To create a new key, see [Create new CMEK key](#new-key).\n 2. Click **Verify** to check if your default service account has cryptokey access to the selected CMEK key.\n 3. If the verification for the selected CMEK key fails, click **Grant** to assign the [CryptoKey Encrypter/Decrypter](/iam/docs/understanding-roles#cloud-kms-roles) IAM role to the default service account.\n6. Click **Done**.\n\n### Create new CMEK\n\n\nYou can create a new CMEK key if you don't want to use your existing key, or if you don't have a key in the specified region.\n| **Note:** You can only use a [symmetric encryption key](/kms/docs/algorithms#symmetric_encryption_algorithms) in Application Integration.\nTo create a new symmetric encryption key, perform the following steps in the **Create a new key** dialog:\n\n1. Select Key ring:\n 1. Click **Key ring** and choose an existing key ring in the specified region.\n 2. If you want to create a new key ring for your key, click the **Create key ring** toggle and do the following steps:\n 1. Click **Key ring name** and enter a name of your key ring.\n 2. Click **Key ring location** and choose the regional location of your key ring. **Note:** For CMEK encryption, your key ring must be created in the same region where you have set up Application Integration.\n 3. Click **Continue**.\n2. Create Key:\n 1. Click **Key name** and enter a name for your new key.\n 2. Click **Protection level** and select either **Software** or **HSM** .\n\n For information about protection levels, see [Cloud KMS protection levels](https://cloud.google.com/kms/docs/protection-levels).\n3. Review your key and key ring details, and click **Continue**.\n4. Click **Create**.\n\n| **Note:** You must enable CMEK in a region before creating or publishing integrations in that region. Failure to do so may result in errors.\n\nEncrypted data\n--------------\n\n\nThe following table lists the data encrypted in Application Integration:\n\nCloud KMS quotas and Application Integration\n--------------------------------------------\n\nWhen you use CMEK in Application Integration,\nyour projects can consume Cloud KMS cryptographic requests\nquotas. For example, CMEK keys can consume these quotas for each encryption and decryption call.\n\nEncryption and decryption operations\nusing CMEK keys affect Cloud KMS quotas in these ways:\n\n- For software CMEK keys generated in Cloud KMS, no Cloud KMS quota is consumed.\n- For hardware CMEK keys---sometimes called Cloud HSM keys---encryption and decryption operations count against [Cloud HSM quotas](/kms/quotas#hsm) in the project that contains the key.\n- For external CMEK keys---sometimes called Cloud EKM keys---encryption and decryption operations count against [Cloud EKM quotas](/kms/quotas#ekm) in the project that contains the key.\n\nFor more information, see\n[Cloud KMS quotas](/kms/quotas)."]]