Files
bakery-ia/infrastructure/platform/security/encryption

Kubernetes Secrets Encryption

This directory contains configuration for encrypting Kubernetes secrets at rest.

What is this for?

Kubernetes secrets are stored in etcd, and by default they are stored as plaintext. This encryption configuration ensures that secrets are encrypted when stored in etcd, providing an additional layer of security.

Files

  • encryption-config.yaml - Main encryption configuration file

How it works

  1. The API server uses this configuration to encrypt secrets before storing them in etcd
  2. When secrets are retrieved, they are automatically decrypted by the API server
  3. This provides encryption at rest for all Kubernetes secrets

Security Notes

  • The encryption key is stored in this file (base64 encoded)
  • This file should be protected and not committed to version control in production
  • For development, this provides basic encryption at rest
  • In production, consider using a proper key management system

Generating a new key

openssl rand -base64 32

Configuration Details

  • Algorithm: AES-CBC with 256-bit keys
  • Provider: aescbc - AES-CBC encryption provider
  • Fallback: identity - Allows reading unencrypted secrets during migration

Usage

This configuration is automatically used by the Kind cluster configuration in kind-config.yaml. The file is mounted into the Kubernetes control plane container and referenced by the API server configuration.

Rotation

To rotate keys:

  1. Add a new key to the keys array
  2. Make the new key the first in the array
  3. Restart the API server
  4. Old keys can be removed after all secrets have been re-encrypted with the new key

Compliance

This encryption helps satisfy:

  • GDPR Article 32 - Security of processing
  • PCI DSS Requirement 3.4 - Encryption of sensitive data
  • ISO 27001:2022 - Cryptographic controls