Manage encrypted storage buckets

This page shows you how to manage encrypted Google Distributed Cloud (GDC) air-gapped storage buckets.

Before you begin

A project namespace manages bucket resources in the org admin cluster. You must have a project to work with buckets and objects.

You must also have the appropriate bucket permissions to perform the following operation. See Grant bucket access.

Manage encryption resources

Buckets with v2 encryption would have a secret kekRef and several AEADKeys created, in which kekRef is used to reference active default AEADKeys being used and AEADKeys include active and archive ones belong to the bucket.

Refresh active default AEADKeys for a bucket

As a best practice, refresh your bucket's default AEADKeys after approximately 42 billion object writes. This proactive step enhances security and prevents key exhaustion. The refresh process will create a new kekRef and deactivates the previous AEADKeys. To start the refresh process, delete the kekRef secret associated with the bucket.

The previous kekRef can be retrieved by running the following command to retrieve:

kubectl get secrets -n NAMESPACE_NAME -l  object.gdc.goog/bucket-name=BUCKET_NAME

Then you can run the following to delete the existing kekRef:

kubectl delete secrets OLD_KEKREF_NAME -n  NAMESPACE_NAME

After the successful deletion, you can run the following to confirm a new kekRef has been created based on AGE:

kubectl get secrets -n NAMESPACE_NAME -l  object.gdc.goog/bucket-name=BUCKET_NAME

Verify new default AEADKeys have been created based on AGE:

kubectl get aeadkeys -n NAMESPACE_NAME -l  cmek.security.gdc.goog/resource-name=BUCKET_NAME

Rotate default AEADKeys for a bucket

If an AEADKey for your bucket becomes compromised, you must manually rotate the key encryption keys associated with the bucket.

To start the process, you must first [refresh the active default keys][#refresh-keys]. This creates new active default AEADKeys, and marks the previous key encryption keys as deactivated. After the default keys refresh, the subsequent object uploads use the new AEADKeys as the key encryption keys. The previous AEADKeys are not destroyed, so you can still decrypt existing objects that were previously encrypted using those keys.

Next, follow the steps to download and re-upload the objects in your bucket and delete the old objects.

After you re-upload all the objects in your bucket, you can clean up the inactive AEADKeys and old objects. Identify the deactivated AEADKeys based on AGE:

kubectl get aeadkeys -n NAMESPACE_NAME -l  cmek.security.gdc.goog/resource-name=BUCKET_NAME
```

Lastly, follow the steps to [delete the AEADKeys](/distributed-cloud/hosted/docs/latest/gdch/application/ao-user/kms/create-delete-keys#delete).

Note: You can also [create a new bucket](/distributed-cloud/hosted/docs/latest/gdch/platform/pa-user/create-storage-buckets) and [delete and crypto-shred the compromised bucket](/distributed-cloud/hosted/docs/latest/gdch/platform/pa-user/delete-storage-buckets).