Search Postgresql Archives

RE: Application Level Encryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Michel Pelletier <pelletier.michel@xxxxxxxxx>
Sent: 05 July 2020 23:32
To: Sam Gendler <sgendler@xxxxxxxxxxxxxxxx>
Cc: Zahir Lalani <ZahirLalani@oliver.agency>; pgsql-general@xxxxxxxxxxxxxx
Subject: Re: Application Level Encryption

 

 

 

On Sun, Jul 5, 2020 at 3:23 PM Sam Gendler <sgendler@xxxxxxxxxxxxxxxx> wrote:

 

 

On Sun, Jul 5, 2020 at 11:41 AM Michel Pelletier <pelletier.michel@xxxxxxxxx> wrote:

 

 

I'm working on an approach where the decrypted DEK only lives for the lifetime of a transaction, this means hitting the kms on every transaction that uses keys.  It will be slower, but the time the decrypted key stays in memory would be minimized.

 

Watch out for KMS api quotas if you go that route.  Their docs don't state what the default quotas are, so you have to go to your quotas page in the console to find out, but they likely aren't very high and might well be exceeded by the transaction rate on even a relatively small db instance.

 

Thanks for pointing that out, it's true that it's a limited route with cloud KMS.   If you control the device like a Zymkey in a secure enclosure, the cost is minimal, although the key derivation rate is very slow.

 

-Michel

 

**

Thank you for the explanation – that makes sense, but I need to read the docs to understand better. Any suggestions on how people usually deal with reporting in this scenario, considering off the shelf tools don’t usually have this mechanism?

 

Z

 


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Postgresql Jobs]     [Postgresql Admin]     [Postgresql Performance]     [Linux Clusters]     [PHP Home]     [PHP on Windows]     [Kernel Newbies]     [PHP Classes]     [PHP Books]     [PHP Databases]     [Postgresql & PHP]     [Yosemite]

  Powered by Linux