When it comes to cloud storage security and data encryption, a single solution for every industry, company, and organization isn’t such a good idea. Different encryption options benefit some users more than others. To help you manage, protect, and secure your data in Google Cloud, we will make support for customer-managed encryption keys (CMEK) generally available soon. Go to the Release Notes page for the latest information.
Storage encryption processes obscure and protect your data from unauthorized access and usage. In NetApp® Cloud Volumes Service for Google Cloud, encryption is a built-in security mechanism that protects data at rest. CMEK adds another layer of security: You create the encryption keys by using Google Cloud Key Management Service (KMS), and these keys are used by the Google server to encrypt data before standard Google Cloud Storage encryption is applied.
The data encryption built into Cloud Volumes Service is the simplest data security and is sufficient for many storage requirements. However, for sensitive data, CMEK can provide additional security and thwart certain attack scenarios. With CMEK, these volume keys are wrapped using keys supplied by Google Cloud KMS. This further protects your data from being read if the underlying storage devices experience unauthorized physical access.
This feature gives you control over the encryption keys used and the added security of storing the keys on a system or in a location different from the data. Cloud Volumes Service supports Google Cloud KMS capabilities such as hardware security modules (HSMs), Cloud External Key Manager (EKM), and the full key management lifecycle (generate, use, rotate, destroy).
With CMEK, you can use your own encryption key to protect the data in your storage account. When you specify a customer-managed key, that key is used to protect and control access to the key that encrypts your data. Customer-managed keys offer greater flexibility to manage access controls.
Using CMEK makes you solely responsible for your keys and your data. If the Cloud KMS key is destroyed or deactivated, Cloud Volumes Service stops access to any volumes using that key after 60 minutes, and you can no longer create volumes in that region. You lose access to existing volumes and their data unless you restore the key. Neither Google nor NetApp can help you recover the volume data if this happens.
Although security is one of the most important aspects of enterprise storage deployment, there’s more than Google Cloud Storage encryption to consider when deploying on Google Cloud. You need your storage footprint to be cost efficient and space efficient, protected from data loss, and easy to replicate for dev/test purposes. That’s all possible with Cloud Volumes Service for Google Cloud.
With Cloud Volumes Service, Google Cloud customers now have access to instant NetApp Snapshot™ copies, data clone capabilities, and multiple price/performance tiers for NFS and SMB file storage.
More recent enhancements
Request to talk to specialist
Start a free trial
Robert is a senior product marketing manager with over 20 years of product marketing and product management experience. He is focused on NetApp’s Cloud Data Services, working to enable customers to deliver business outcomes for all IT workloads in cloud, multicloud, and hybrid cloud environments. Robert is an avid cyclist and loves to be outdoors.
Brush up on the latest trends and developments in cloud, on premises, and everywhere in between. This is where it all gets real, with a cherry on top.
Explore a wide range of open forums where you can post questions, share answers and just generally get smart on all the NetApp technologies that matter most to you.