More Info:

Ensure that the use of Google-managed encryption keys for Cloud SQL database instances is disabled at the GCP organization level in order to enforce the use of Customer-Managed Keys (CMKs) and have full control over SQL database encryption/decryption process.

Risk Level

Medium

Address

Security, Operational Maturity

Compliance Standards

ISO27001, HIPAA

Triage and Remediation

Remediation

To remediate the misconfiguration of “Restrict Default Google-Managed Encryption for Cloud SQL Instances” in GCP using GCP console, follow the below steps:

  1. Login to your GCP console.

  2. Navigate to the Cloud SQL Instances page.

  3. Select the instance for which you want to remediate the misconfiguration.

  4. Click on the “Edit” button at the top of the page.

  5. Scroll down to the “Encryption” section.

  6. Under the “Encryption in transit” section, select “Require SSL” option.

  7. Under the “Encryption at rest” section, select “Customer-managed encryption key” option.

  8. Provide the required details for Customer-managed encryption key, such as key name, key version and key location.

  9. Click on the “Save” button to save the changes.

  10. Verify the changes by checking the “Encryption” section on the Cloud SQL instance page.

By following the above steps, you have successfully remediated the misconfiguration of “Restrict Default Google-Managed Encryption for Cloud SQL Instances” in GCP using GCP console.