Configure the Customer-Managed Encryption Key (CMEK) for an rewrite.
With CMEK you can use keys generated by Google Cloud's Key Management Service to encrypt the data in your objects. Use this option to configure the CMEK of an object created as part of a rewrite operation. Key names can be found from the Google Cloud console, and are in the projects/{PROJECT_ID}/locations/{LOCATION_ID}/keyRings/{KEY_RING_ID}/cryptoKeys/{CRYPTO_KEY_ID} format.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-04-02 UTC."],[[["This page provides access to the documentation for various versions of the `DestinationKmsKeyName` structure within the Google Cloud C++ client library for Storage, ranging from version 2.11.0 up to the latest release candidate 2.37.0-rc."],["The `DestinationKmsKeyName` structure is used to configure Customer-Managed Encryption Keys (CMEK) for objects during rewrite operations in Google Cloud Storage."],["CMEK allows users to encrypt data in their Google Cloud Storage objects using keys generated by Google Cloud's Key Management Service, providing greater control over data security."],["The documentation provides a `well_known_parameter_name()` function."],["The key names should be in the `projects/{PROJECT_ID}/locations/{LOCATION_ID}/keyRings/{KEY_RING_ID}/cryptoKeys/{CRYPTO_KEY_ID}` format."]]],[]]