Compute Engine Encryption Options Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary responsibility of Compute Engine regarding default encryption?

  • It requires manual configuration for encryption settings.
  • It allows only third-party encryption solutions.
  • It automatically encrypts customer content at rest without additional actions. (correct)
  • It provides insurance against data loss through encryption.

What does a customer-managed encryption key (CMEK) allow you to control?

  • The management of symmetric key encryption keys by Google.
  • The protection level, location, and access permissions of the keys. (correct)
  • The encryption algorithm used by Google.
  • The physical security of the Compute Engine hardware.

Which of the following is necessary when managing resources with customer-supplied encryption keys (CSEKs)?

  • Automatically encrypting all data using default settings.
  • Overriding Google’s management of key encryption.
  • Forgetting about key management after initial setup.
  • Specifying the key used for encrypting the resource at all times. (correct)

How can you create customer-managed encryption keys (CMEKs)?

<p>By utilizing Cloud KMS Autokey or creating them manually. (D)</p> Signup and view all the answers

What does enabling Confidential mode add to Hyperdisk Balanced disks?

<p>Additional hardware-based encryption. (B)</p> Signup and view all the answers

Which encryption types are supported for disk clones and machine images in Compute Engine?

<p>CMEKs and Google-default encryption. (D)</p> Signup and view all the answers

What happens when you use Cloud KMS Autokey to create keys?

<p>Keys and key rings are generated on demand during resource creation. (C)</p> Signup and view all the answers

What is a key feature of customer-supplied encryption keys (CSEKs)?

<p>They require the customer to manage and provide the key. (D)</p> Signup and view all the answers

What must be done to encrypt a snapshot in relation to the source disk's key?

<p>Use the same key that was used to encrypt the source disk (B)</p> Signup and view all the answers

Which statement is true regarding disk encryption in Compute Engine?

<p>Disks can be encrypted using either Google-managed, customer-managed, or customer-supplied keys (C)</p> Signup and view all the answers

What is required when creating a snapshot using the gcloud CLI or API?

<p>Retrieve and utilize the resource identifier of the key used for the source disk (A)</p> Signup and view all the answers

What does the diskEncryptionKey object in a JSON response indicate?

<p>Information about whether the disk uses CMEK or CSEK encryption (B)</p> Signup and view all the answers

Which mode extends hardware-based encryption to Hyperdisk Balanced volumes?

<p>Confidential Mode (A)</p> Signup and view all the answers

What is a requirement for using Hyperdisk Balanced volumes in Confidential mode?

<p>They must be deployed on Confidential VMs using the N2D machine type (B)</p> Signup and view all the answers

Which tool can you use to view a disk's encryption type?

<p>Google Cloud console (C)</p> Signup and view all the answers

How can key usage tracking benefit users utilizing customer-managed encryption keys?

<p>It provides visibility into which resources are protected by a key (D)</p> Signup and view all the answers

What action must be taken if the disk uses CSEK-encryption?

<p>Consult the organization's administrator for key details (A)</p> Signup and view all the answers

Flashcards

Google Default Encryption

Compute Engine's default encryption setting, where Google manages the encryption keys.

Key Encryption Key (KEK)

A key used to encrypt another key, typically used to encrypt data at rest.

Customer-Managed Encryption Key (CMEK)

A key encryption key (KEK) that is managed by you in Google Cloud Key Management Service (KMS).

Customer-Supplied Encryption Key (CSEK)

You provide the key encryption key (KEK) yourself when creating or managing an encrypted resource.

Signup and view all the flashcards

Confidential Mode

A feature that adds hardware-based encryption to Hyperdisk Balanced disks, enhancing data security.

Signup and view all the flashcards

Hyperdisk Balanced Disk

A type of disk that can be encrypted with Confidential Mode, providing enhanced security.

Signup and view all the flashcards

Cloud KMS Autokey

A way to automatically create and manage customer-managed encryption keys (CMEKs) in Google Cloud KMS.

Signup and view all the flashcards

Cloud KMS

A service within Google Cloud that allows you to manage and control encryption keys.

Signup and view all the flashcards

Google-managed encryption

The default encryption method for Compute Engine disks. Google manages the encryption keys.

Signup and view all the flashcards

Confidential Mode for Hyperdisk Balanced volumes

A feature that enables hardware-based encryption for Hyperdisk Balanced volumes, enhancing security without application changes.

Signup and view all the flashcards

Confidential VMs

A special type of VM that runs on a secure environment, leveraging hardware-based encryption for sensitive workloads.

Signup and view all the flashcards

Cloud Key Management Service (Cloud KMS)

A service that allows you to manage and use encryption keys to protect your data in Google Cloud.

Signup and view all the flashcards

Compute Engine Persistent Disks

A service that allows you to store and manage persistent disks for your virtual machines.

Signup and view all the flashcards

Key Usage Tracking

The mechanism by which Cloud KMS allows you to track which resources are protected by a specific key.

Signup and view all the flashcards

Cloud Shell

A tool provided by Google Cloud for interacting with the command line and managing resources.

Signup and view all the flashcards

Hyperdisk Balanced Volumes

A type of disk in Compute Engine that provides high throughput and low latency for demanding workloads, such as databases.

Signup and view all the flashcards

Study Notes

Compute Engine Encryption Options

  • Compute Engine encrypts customer data at rest by default (Google default encryption).
  • Users can customize encryption using key encryption keys (KEKs).
  • KEKs encrypt Google-generated keys used for data encryption.

Key Encryption Key (KEK) Options

  • Customer-Managed Encryption Keys (CMEKs): Recommended.
    • Users manage encryption keys in Cloud KMS, controlling protection, location, rotation, usage, and access.
    • Allows key usage tracking, audit log viewing, and key lifecycle control.
    • CMEKs can be created manually or automatically using Cloud KMS Autokey.
    • Disks encrypted with CMEKs usually don't require key specification after creation.
  • Customer-Supplied Encryption Keys (CSEKs):
    • Users manage encryption keys outside Compute Engine.
    • The encryption key must be specified when creating or managing a disk/resource using CSEKs.

Additional Security Features

  • Confidential Mode for Hyperdisk Balanced Disks: Adds hardware-based encryption to Hyperdisk Balanced disks.
    • Enables additional security without application refactoring.
    • Can only be used with Confidential VMs.
    • Limited to specific machine types (N2D) and regions.

Supported Encryption Types

  • Disk clones and machine images support Google-default, CMEKs, and CSEKs.
  • Standard snapshots and instant snapshots support Google-default, CMEKs, and CSEKs.

Cloud KMS Autokey

  • Autokey automatically generates keys and key rings on demand during resource creation.
  • Automatically creates service agents and grants required IAM roles.
  • Does not create new keys for snapshots; the source disk's key is automatically applied.
  • Manual intervention required for snapshots created with gcloud CLI, Terraform, or API.

Checking Disk Encryption

  • Use the gcloud CLI, Google Cloud Console, or Compute Engine API to view a disk's encryption type.
  • Encryption type appears in the "Properties" table, under "Encryption".

Determining if a Disk is Encrypted

  • A "diskEncryptionKey" field indicates an encrypted disk within a JSON object.
  • The object contains details about CMEK or CSEK encryption.

Information Retrieval Based on Encryption Type

  • CMEK: View detailed key, key ring, and location information via "View keys by project" steps.
  • CSEK: Contact the organization administrator for key details.

CMEK Benefits

  • Key usage tracking allows observing which resources the key protects.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Google Cloud Compute Services Quiz
5 questions
Google Cloud Compute Engine Quiz
5 questions
Google Cloud Compute Engine Security
61 questions
Google Cloud Compute Engine and VPC Overview
25 questions
Use Quizgecko on...
Browser
Browser