Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EKS] Encrypt secrets at rest in etcd #263

Closed
ChrisCooney opened this issue Apr 21, 2019 · 16 comments
Closed

[EKS] Encrypt secrets at rest in etcd #263

ChrisCooney opened this issue Apr 21, 2019 · 16 comments
Labels
EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue

Comments

@ChrisCooney
Copy link

ChrisCooney commented Apr 21, 2019

Tell us about your request
As part of K8s 1.13, encryption of k8s secret resources inside etcd is now fully supported. EKS should support this, as many organisations require that their sensitive information is stored in an encrypted format.

Which service(s) is this request for?
EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Many organisations have a hard requirement that sensitive information is encrypted, both in transit and in storage. Currently, EKS does not support encryption of k8s secrets at rest, which creates a barrier to adoption.

Are you currently working around this issue?
There are third party controllers that we're using, but since k8s 1.13 is going to support this natively, this will likely become the dominant method for at rest encryption.

EDIT: Since EKS does support encryption in Etcd, this should clearly be documented somewhere in the Aws documentation.

@ChrisCooney ChrisCooney added the Proposed Community submitted issue label Apr 21, 2019
@ejc3
Copy link

ejc3 commented Apr 21, 2019

AWS encrypts etcd at rest:
https://blog.uprightvinyl.co.uk/2018/02/08/aws-builders-day-part-3-kubernetes-on-aws-with-amazon-eks/

Are you looking for keys you control?

@ChrisCooney
Copy link
Author

Ah wow, nevermind then. I read an article recently that pointed out EKS was still plaintext at rest. I'll be sure to comment on the article. Thank you, I'll close this now.

@thisisananth
Copy link

I think we would be more comfortable if AWS states that in their documentation. It is not stated anywhere!!!

@maltekrupa
Copy link

I opened an issue about this exact topic a couple of days ago with AWS support. I'm still waiting for an answer.

I also asked to put this information somewhere in the documentation to make sure I don't have to forward customers to a third party blog when they ask me about encryption of EKS.

@thisisananth
Copy link

HI @temal- Did you hear back from AWS about this? Can you please update this with what they told? Thanks!

@maltekrupa
Copy link

@thisisananth Sadly not. As soon as I hear back, I'll write it down here!

@ChrisCooney Do you think it is worth reopening this issue? From my point of view it is still not clear if EKS supports encryption at rest for etcd.

@ChrisCooney
Copy link
Author

I'm inclined to agree. The absence of detail in the documentation is enough. Perhaps the title needs to change to prevent it being benched.

@ChrisCooney ChrisCooney reopened this Aug 8, 2019
@jacob-koren-zooz
Copy link

Any update on this issue? Was the documentation updated? I can't find anything about encryption of secrets in EKS

@maltekrupa
Copy link

Latest update:

I heard from the service team that they are working on the official documentation and will be published soon.

@pmnhatdn
Copy link

Hi @temal- have you got any update from AWS on the update of EKS secret encryption documentation?

Thanks

@maltekrupa
Copy link

@pmnhatdn Not yet, no.

@maltekrupa
Copy link

I got an answer:

Greetings Malte!!!
I appreciate for the patience while I get the response from the service team.
Good news is that I was able to get the answer to this particular query from service team. The answer is yes, the data stored by etcd is encrypted at rest.
EKS team planning to share the details through the FAQ in future, however no ETA can be provided.
Again, should you have any other questions or queries, please so not hesitate to reach out to us and we will be happier to assist.
Have a great day ahead!
Best regards,

🎉

My issue with AWS about this topic is closed. I guess we should let the github issue open till the documentation appears in the FAQ. Else this comment from me is as worthy as the blogpost posted in the beginning.

@fgreinacher
Copy link

Based on the information above is it safe to assume that using Kubernetes secrets for sensitive data in a production environment is an appropriate solution?

@tabern tabern added the EKS Amazon Elastic Kubernetes Service label Sep 17, 2019
@tabern tabern added this to We're Working On It in containers-roadmap Sep 17, 2019
@jason-riddle
Copy link

jason-riddle commented Sep 19, 2019

Can this title be updated to “Add etcd encryption-at-rest documentation to EKS service docs/faq”? The title in its current form makes it seem like etcd isn’t encrypted at rest which is confusing when people open to read the comments and is not the case.

@tabern
Copy link
Contributor

tabern commented Oct 11, 2019

It seems like there are two asks here, a public statement about the encryption of data at rest within EKS etcd and the ability to enable envelope encryption of Kubernetes secrets using a customer managed key (CMK).

As of today, we now include a public statement about etcd encryption in the EKS documentation:

All of the data stored by the etcd nodes and associated Amazon EBS volumes is encrypted. Amazon EKS uses master encryption keys that generate volume encryption keys which are managed by the Amazon EKS service.

Additionlly, we plan to enable the AWS Encryption Provider on EKS and allow you to provide a AWS KMS CMK that will be used for envelope encryption of Kubernetes secrets on the cluster.

You can track this on #530

-nate

@tabern tabern closed this as completed Oct 11, 2019
@tabern tabern moved this from We're Working On It to Just Shipped in containers-roadmap Oct 11, 2019
@ChrisCooney
Copy link
Author

ChrisCooney commented Oct 11, 2019 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue
Projects
Development

No branches or pull requests

9 participants