Elastic Blog | Elasticsearch, Kibana, and ELK Stack

Encryption at rest in Elastic Cloud: Bring your own key with Azure Key Vault

Encryption at rest ensures data security by encrypting data at storage. Elastic Cloud offers "bring your own key" (BYOK) feature, allowing users to encrypt data using their own keys managed by cloud provider's KMS. To implement encryption at rest with Azure Key Vault keys, create an RSA key in Azure Key Vault and grant Elastic Cloud access to the key. Configure Azure Identity and Access Management (IAM) policies to control access to the Elastic cluster and the Azure Key Vault. Create an Elastic Cloud deployment and enable the "Use a customer-managed encryption key" option, providing the Azure Key Vault key identifier. The deployment will be encrypted using the specified key. Azure Key Vault keys provide key rotation and revocation capabilities, ensuring data security. Elastic automatically manages key rotations for Elastic Cloud deployments. If a key is compromised, it can be manually revoked in Azure Key Vault, prompting deletion of the deployment. Key restoration is possible if revocation is accidental. Implementing encryption at rest with Azure Key Vault keys enhances data security and compliance in Elastic Cloud deployments. Custom snapshot repositories may require additional encryption measures.
favicon
elastic.co
elastic.co