More Info:

Ensure that boot disk on k8 node pools are encrypted with CMK

Risk Level

High

Address

Security

Compliance Standards

ISO27001

Triage and Remediation

Remediation

To remediate the misconfiguration, follow these steps:

  1. Open the Google Cloud Platform (GCP) Console and navigate to the Kubernetes Engine page.

  2. Select the cluster that you want to remediate.

  3. Click on the “Nodes” tab and select the node pool that you want to remediate.

  4. Click on the “Edit” button to edit the node pool.

  5. Scroll down to the “Security” section and click on the “Show” button next to “Boot disk encryption”.

  6. Select “Customer-managed encryption keys” from the drop-down menu.

  7. Click on the “Select a key” button and choose the key that you want to use for encryption.

  8. Click on the “Save” button to save the changes.

  9. Repeat steps 4-8 for each node pool in the cluster.

  10. Verify that the boot disk encryption has been configured correctly by checking the “Encryption” column in the nodes list. It should show “Customer-managed” for each node.

By following these steps, you have successfully remediated the misconfiguration by encrypting the Kubernetes boot disk with customer-managed keys in GCP using the GCP console.

Additional Reading: