Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS)
От | Bruce Momjian |
---|---|
Тема | Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS) |
Дата | |
Msg-id | 20190813001432.jjru4nruef4ingwg@momjian.us обсуждение исходный текст |
Ответ на | Re: [Proposal] Table-level Transparent Data Encryption (TDE) and KeyManagement Service (KMS) (Bruce Momjian <bruce@momjian.us>) |
Ответы |
Re: [Proposal] Table-level Transparent Data Encryption (TDE) and Key Management Service (KMS)
|
Список | pgsql-hackers |
On Sat, Aug 10, 2019 at 08:06:17AM -0400, Bruce Momjian wrote: > So, I just had an indea if we use separate encryption keys for > heap/index and for WAL --- we already know we will have an offline tool > that can rotate the passphrase or encryption keys. If we allow the > encryption keys to be rotated independently, we can create a standby, > and immediately rotate its heap/index encryption key. We can then start > streaming replication. When we promote the standby to primary, we can > then shut it down and rotate the WAL encryption key --- the new primary > would then have no shared keys with the old primary. To help move this forward, I created a new wiki TDE section titled "TODO for Full-Cluster Encryption" and marked some unresolved items with question marks: https://wiki.postgresql.org/wiki/Transparent_Data_Encryption#TODO_for_Full-Cluster_Encryption I have also updated some of the other text to match conclusions we have made. I know some of the items are done, but if we have agreement on moving forward, I can help with some of the missing code. This looks doable for PG 13 if we start soon. -- Bruce Momjian <bruce@momjian.us> http://momjian.us EnterpriseDB http://enterprisedb.com + As you are, so once was I. As I am, so you will be. + + Ancient Roman grave inscription +
В списке pgsql-hackers по дате отправления: