Data at Rest Encryption

🌐 This document is available in both English and Ukrainian. Use the language toggle in the top right corner to switch between versions.

1. General overview

Data at Rest Encryption (DARE) is a method for safeguarding the confidentiality and integrity of data while it is stored on media such as disks, file systems, or databases. It differs from transport encryption, which is employed to protect data during its transmission over a network. This approach ensures data confidentiality in cases of physical access to the storage media, such as loss, theft, or unauthorized access to the physical device.

2. Application of Data at Rest Encryption

Data encryption is applied to two key components of the platform. Disk encryption is applied to components of the container orchestration system, as well as the system’s own storage. Both operations are performed by the Platform registry installer during deployment.

2.1. Storage encryption

All data residing in block-type storage is encrypted at rest. Consequently, all data storage backups are automatically encrypted and protected from unauthorized access.

Storage devices are encrypted using a data key, utilizing the industry-standard AES-256-XTS data encryption algorithm recommended by NIST SP 800-38E.

2.2. Container orchestration system storage encryption

The storage of keys and values in the container orchestration system contains sensitive secrets and confidential information and, therefore, must be encrypted. For optimal system performance, only the following resources are encrypted:

  • Secrets

  • Configuration

  • Routes

  • OAuth mechanism access tokens

Encryption is accomplished using the AES-CBC algorithm with PKCS#7 padding and a 32-byte key.

3. Impact on performance and availability

Encryption has a minimal impact on the quality attributes of the Platform. Read and write operations occur nearly as quickly as without encryption, with minimal latency.

4. Key management and security

Key management is a critical aspect of utilizing data at-rest encryption. Effective key management ensures the security of encrypted data and prevents unauthorized access.

Reliable algorithms and methods are used for key generation. Encryption keys are stored in secure locations with limited access.

Encryption keys have defined lifecycle stages, including creation, usage, maintenance, and deletion.

Rotation of disk encryption keys occurs automatically once a year, and rotation of container orchestration system storage encryption keys occurs weekly.