Description
What would you like to be added:
Encryption of confidential data at rest in Kubernetes is very crucial for ensuring a strong security posture. To enable that, Kubernetes supports a few options for configuring encryption at rest. Given that using a KMS-based encryption provider ensures a very robust security posture as compared to the other options, it's a great choice in an environment where integration with such a system is possible. When using a KMS-based provider, a KMS plugin is required to enable the integration. For instance, this is the plugin to bridge the integration for the AWS KMS offering. Once set up, the API server communicates to the plugin over a UNIX domain socket using gRPC. For that to work, when the API server is deployed as a pod as is the case when provisioned by the Karmada operator, the plugin has to run as a sidecar of the API server container.
Why is this needed:
At Bloomberg, we're currently building a managed Karmada platform and want to use the Karmada operator to manage the entire lifecycle of managed Karmada
instances. One of our core requirements is to configure encryption at rest for managed Karmada control planes. Do do so, we want to integrate with our internal KMS as that will ensure a very strong security posture that adheres to our operational standards.
Metadata
Metadata
Assignees
Type
Projects
Status
No status
Activity