Ensure that all the Google Cloud tasks available within your GCP project are encrypted at rest with Customer-Managed Encryption Keys (CMEKs) instead of Google-managed encryption keys. CMEKs provide greater control over the encryption and decryption process, enabling you to meet stringent compliance requirements. In Google Cloud Tasks, Customer-Managed Encryption Keys (CMEKs) are enabled regionally, not per task. Enabling a CMEK for a region protects all new tasks created in that region. Existing tasks are not protected.
By default, Google Cloud Tasks service encrypts all customer data at rest using Google-managed encryption keys. This type of encryption is handled by GCP without any additional effort from you or your application. However, if you prefer to have full control over data encryption, you can use your own Customer-Managed Encryption Key (CMEK). To create and manage your own CMEKs, utilize Cloud Key Management Service (Cloud KMS). Cloud KMS offers secure and efficient encryption key management, including controlled key rotation and revocation mechanisms.
Audit
To determine if your Google Cloud tasks are protected with Customer-Managed Encryption Keys (CMEKs), perform the following operations:
Getting the encryption configuration information for Cloud Tasks service using Google Cloud Management Console is not currently supported.Remediation / Resolution
To enable encryption at rest with Customer-Managed Encryption Keys (CMEKs) for all your Google Cloud tasks, perform the following operations:
Enabling encryption at rest with CMEKs for Cloud Tasks resources using Google Cloud Management Console is not currently supported.References
- Google Cloud Platform (GCP) Documentation
- Understand Cloud Tasks
- Use customer-managed encryption keys
- Create a key ring
- Create a key
- GCP Command Line Interface (CLI) Documentation
- Create a key
- gcloud tasks cmek-config describe
- gcloud tasks cmek-config update
- gcloud kms keyrings create
- gcloud kms keys create
- gcloud kms keys add-iam-policy-binding