Enable encryption of in-transit data for Pod communications across Google Kubernetes Engine (GKE) cluster nodes with Customer-Managed Encryption Keys (CMEKs) in order to protect sensitive data from interception and providing greater control over encryption keys, ensuring compliance with regulatory and organizational requirements.
By default, Google encrypts all in-transit data between virtual machines (VMs) at the network interface controller (NIC) level, ensuring data confidentiality regardless of the services or applications running on the VM, including Google Kubernetes Engine (GKE). This encryption applies to all GKE nodes and Pod traffic, with encryption keys managed by Google. Inter-node transparent encryption for GKE offers additional control over the encryption keys used to secure Pod traffic across GKE nodes. This encryption, performed using WireGuard within GKE Dataplane V2, supplements the default encryption provided at the VM NIC level. Having direct control over encryption keys in Google Kubernetes Engine (GKE) is particularly beneficial for regulated industries, where compliance and security audits are critical.
Inter-node transparent encryption is only available for GKE Dataplane V2 clusters enabled with the Google Kubernetes Engine (GKE) Enterprise edition.
Audit
To determine if inter-node transparent encryption is enabled for your Google Kubernetes Engine (GKE) clusters, perform the following operations:
Remediation / Resolution
To enable inter-node transparent encryption for your Google Kubernetes Engine (GKE) clusters, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Security overview
- Encrypt your data in-transit in GKE with user-managed encryption keys
- GKE Dataplane V2
- GKE Enterprise technical overview
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud container clusters list
- gcloud container clusters describe
- gcloud container clusters update