Encrypt Data

Enable and configure Kubernetes secret data encryption at rest

Encrypt Secret data at rest

For more details and examples, please refer to upstream documentation.

Configuring

To enable secret encryption at rest perform the following steps:

  1. Create a new encryption configuration file, for example kubernetes-encryption-config.yaml:
apiVersion: apiserver.config.k8s.io/v1
kind: EncryptionConfiguration
resources:
  - resources:
    - secrets
    providers:
    - aescbc:
        keys:
        - name: key1
          secret: <BASE 64 ENCODED SECRET>
    - identity: {}
  1. Generate a 32 byte random key and base64 encode it. If you’re on Linux or macOS, run the following command:
head -c 32 /dev/urandom | base64
  1. Place that value in the secret field of the configuration file.

  2. Create a DC/OS secret with the encryption configuration file.

$ dcos security secrets create -f kubernetes-encryption-config.yaml kubernetes-cluster/encryption-config

IMPORTANT: The service account for the Kubernetes cluster requires permissions to read the secret containing the encryption configuration.

  1. To enable Kubernetes secret encryption at rest you need to set .kubernetes.encryption_config with the name of the DC/OS secret where the configuration is stored.
{
    "kubernetes": {
        "encryption_config": "kubernetes-cluster/encryption-config"
    }
}

Ensure all secrets are encrypted

Secrets are encrypted on write, performing an update on a secret will encrypt the content.

kubectl get secrets --all-namespaces -o json | kubectl replace -f -

The command reads all secrets and then updates them to apply server side encryption. If an error occurs due to a conflicting write, retry the command. For larger clusters, you may wish to subdivide the secrets by namespace or script an update.

Verify that secrets are encrypted

  1. Execute into one of the etcd pods:

dcos exec -it etcd-0-peer /bin/bash

  1. Fetch a secret using etcdctl:

    NOTE: For example purposes, use namespace=default secret=testing-secret.

   ETCDCTL_API=3 \
     etcdctl \
     --cert=etcd-crt.pem \
     --key=etcd-key.pem \
     --cacert=ca-crt.pem \
     --endpoints=https://${TASK_NAME}.${FRAMEWORK_HOST}:${ETCD_LISTEN_CLIENT_PORT} \
     get '/"/registry/cluster-0"/secrets/default/testing-secret' | od -cb