You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

22 lines
1.8 KiB

  1. # Encrypting Secret Data at Rest
  2. Before enabling Encrypting Secret Data at Rest, please read the following documentation carefully.
  3. <https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/>
  4. As you can see from the documentation above, 5 encryption providers are supported as of today (22.02.2022).
  5. As default value for the provider we have chosen `secretbox`.
  6. Alternatively you can use the values `identity`, `aesgcm`, `aescbc` or `kms`.
  7. | Provider | Why we have decided against the value as default |
  8. |----------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
  9. | identity | no encryption |
  10. | aesgcm | Must be rotated every 200k writes |
  11. | aescbc | Not recommended due to CBC's vulnerability to padding oracle attacks. |
  12. | kms | Is the official recommended way, but assumes that a key management service independent of Kubernetes exists, we cannot assume this in all environments, so not a suitable default value. |
  13. ## Details about Secretbox
  14. Secretbox uses [Poly1305](https://cr.yp.to/mac.html) as message-authentication code and [XSalsa20](https://www.xsalsa20.com/) as secret-key authenticated encryption and secret-key encryption.