More Info:

Ensure that Bigtable cluster tables are encrypted with CMK.

Risk Level

High

Address

Security

Compliance Standards

SOC2, NIST, GDPR, ISO27001, HIPAA, HITRUST

Triage and Remediation

Remediation

To remediate the issue of Bigtable Cluster Tables not being encrypted with Customer Managed Keys in GCP, follow the below steps:

  1. Open the Google Cloud Console and navigate to the Bigtable instance that you want to remediate.

  2. Click on the “Encryption” tab from the left-hand side menu.

  3. Under the “Encryption at rest” section, click on the “Edit” button.

  4. Select “Customer-managed key” as the encryption type.

  5. Click on the “Select key” button and choose an existing key or create a new one.

  6. Click on the “Save” button to apply the changes.

  7. Once the encryption type is updated, you need to enable the encryption for each table in the Bigtable cluster.

  8. Click on the “Tables” tab from the left-hand side menu and select the table that you want to encrypt.

  9. Click on the “Edit” button and select “Customer-managed key” as the encryption type.

  10. Click on the “Select key” button and choose the same key that you selected in step 5.

  11. Click on the “Save” button to apply the changes.

  12. Repeat steps 8-11 for each table in the Bigtable cluster.

By following the above steps, you can remediate the issue of Bigtable Cluster Tables not being encrypted with Customer Managed Keys in GCP.

Additional Reading: