-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement at-rest encryption for Keys #11
Comments
@lstoll Do you think it'd be too taxing if we just encrypted every value in storage, if the storage is configured that way? Or do you think we need some way to differentiate between non-encrypted and encrypted values? |
Probably not, really. It would make manually reading data from the DB slightly harder, but we shouldn't be doing that anyway. One thing to consider is the lifecycle of keys for rotation - right now, we rotate signer regularly so rotating an encryption key would take affect in a known window. If we do everything, how would we handle an encryption key rotation for a value in storage that lives forever? Definitely something solvable later, just worth a thought. |
Cool.
That's fair. Maybe we have a subcommand that rekeys everything with the latest key, which we use when we rotate the key? I'm not necessarily sold on it, but it would maybe be easier to just transparently encrypt everything than introduce it as a client-specified option everywhere. |
We should have an optional at-rest encryption method for private key data that is persisted in the storage.
The text was updated successfully, but these errors were encountered: