Prerequisites to Use Customer-Managed
Encryption Keys in AWS Key Management Service 🔗
Describes prerequisite steps to use customer-managed master encryption keys
that reside in Amazon Web Services (AWS) Key Management Service (KMS) on Autonomous Database.
Limitations:
AWS KMS is only supported in commercial regions.
Cross-tenancy access, where the Autonomous Database instance and
AWS KMS are in different tenancies, is not supported.
AWS KMS is not supported in cross-region standbys.
AWS KMS is not supported in refreshable clones.
Follow these steps:
Create an AWS policy that grants read access to AWS KMS.
Edit the AWS Role’s Trust Relationship to include Oracle’s User
ARN, and an External ID (tenancy OCID) for additional security.
On Autonomous Database query
CLOUD_INTEGRATIONS.
For example:
SELECT * FROM CLOUD.INTEGRATIONS;
SELECT * FROM CLOUD_INTEGRATIONS;
PARAM_NAME PARAM_VALUE
--------------- ------------------------------------------------------------------------------------------------------------------------------------------
aws_arn arn:aws:iam:…:user/oraclearn
The view CLOUD_INTEGRATIONS is available
to the ADMIN user or to a user with
DWROLE role.
Copy the PARAM_VALUE for aws_user_arn
and save the value for a subsequent step.
Get the tenancy OCID, needed for the External ID.
In the OCI console, click on your Profile, and select
Tenancy to go to the tenancy details page. Copy the
tenancy OCID and save it for a subsequent step.
Create an Autonomous Database
instance that uses the default Encryption key setting of Encrypt using an
Oracle-managed key. See Provision an Autonomous Database Instance for more information.
Note
Encryption key settings
for customer-managed keys in AWS Key Vault are not available during the Autonomous Database instance
creation process. The options are available post provisioning, when editing
the instance.
On the Details page for the Autonomous Database instance, click More actions, and select
Manage encryption key.
Note
If you are already using customer-managed keys in AWS KMS and you want to
rotate the TDE keys, follow these steps and select a different key (select a
key that is different from the currently selected master encryption
key).
On the Manage encryption key page, select Encrypt using a
customer-managed key.
From the Key type drop-down, select Amazon Web Services
(AWS).
The Lifecycle state changes to
Updating. When the request completes, the
Lifecycle state shows
Available.
After the request completes, on the Oracle Cloud
Infrastructure Console, the key information shows on the Autonomous Database instance details
page under the heading Encryption.