Ensure that your Google Kubernetes Engine (GKE) cluster node pools use confidential GKE nodes to encrypt all running workloads. Confidential GKE nodes employ hardware-based memory encryption to safeguard your data and applications from unauthorized access or modification while in use.
To enhance security, utilize confidential GKE nodes for your GKE cluster node pools. These nodes encrypt all workloads, including those currently running, ensuring data confidentiality even if the underlying hardware is compromised.
Confidential GKE cluster nodes require N2D or C2D machine types.
Audit
To determine if your Google Kubernetes Engine (GKE) cluster node pools are using confidential GKE nodes, perform the following operations:
Remediation / Resolution
To enable confidential GKE nodes for Google Kubernetes Engine (GKE) clusters, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Confidential VM overview
- Encrypt workload data in-use with Confidential Google Kubernetes Engine Nodes
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud container clusters list
- gcloud container clusters describe
- gcloud container node-pools list
- gcloud container node-pools describe
- gcloud container node-pools update