Other Articles

Cloud SQL – Enable Disk Encryption

This check ensures that disk encryption is enabled for Cloud SQL instances. Disk encryption protects sensitive data at rest from unauthorized access, even if the underlying storage is compromised.

Check Details

  • Resource: Cloud SQL
  • Check: Configure disk encryption
  • Risk: If disk encryption is not enabled, sensitive database data stored on disks may be exposed in case of unauthorized access, data theft, or compliance violations.

Remediation via Google Cloud Console

  1. Log in to the Google Cloud Console and navigate to Cloud SQL. Cloud Sql Instance
  2. Click on the affected Cloud SQL instance.
  3. Click Edit to modify the instance configuration. Cloud Sql Instance Edit
  4. Scroll to the Data Protection or Encryption section.
  5. Ensure Disk encryption is enabled. Cloud SQL Disk Encryption
  6. Click Save to apply the changes.

Remediation via Google Cloud CLI

  1. Open the Google Cloud Console and launch Cloud Shell. GCP Cloud Shell
  2. Update the Cloud SQL instance to use disk encryption (CMEK example):
    
    
    gcloud sql instances patch <INSTANCE_NAME> \
    --disk-encryption-key <KMS_KEY_RESOURCE_ID>
    

Replace <INSTANCE_NAME> with your Cloud SQL instance name and <KMS_KEY_RESOURCE_ID> with the full resource ID of the Cloud KMS key. Google-managed encryption is enabled by default if no customer-managed key is specified.

Default Value

By default, Cloud SQL encrypts disks using Google-managed encryption keys. Customer-managed encryption keys (CMEK) are not enabled unless explicitly configured.