10 ‐ OCI Vault Integration: Encrypt Boot & Block Volumes with Custom Keys - SanjeevOCI/Ocidocs GitHub Wiki
🔐 Using OCI Vault for Boot & Block Volume Encryption
Secure your compute resources by creating Vaults, managing Encryption Keys, and applying them to Boot and Block Volumes in OCI.
- Navigate to Search Menu --> Search for "Vault" --> Click on "Vault" option OR we can Navigate to Identity & Security --> Key Management & Secret Management.
- Click on "Create Vault" to create the New Vault
2. Create Encryption keys in the Vault
3. Rotate the keys periodically
Rotate keys every quarter or every 6 months. This allows the New data to get encrypted with the new version of the keys. so the data will not get lost.
4. Encrypt Boot volume with Custom managed keys
- Navigate to Burger Menu --> Storage --> Boot Volumes --> Select the Boot Volume --> Click on Encryption Key --> Assign
- The above error indicates that the KMS key doesn't has the right permissions. In order to assign the encryption key to the Boot Volume, we need to create a policy to allow the Block Storage to use keys in the compartment(computecompartment) where the vault is located.
- Now that the policy has been created, we are able to assign the Encryption keys to the Boot volume
5. Encrypt Block volume with Custom managed keys
- Navigate to Burger Menu --> Storage --> Block Volumes --> Select the Block Volume --> Click on Encryption Key --> Assign
The above error indicates that the KMS key doesn't has the right permissions. In order to assign the encryption key to the Boot Volume, we need to create a policy to allow the Block Storage to use keys in the compartment(computecompartment) where the vault is located
6. We need to Rotate keys every quarter or every 6 months. This allows the New data to get encrypted with the new version of the keys. so the data will not get lost.
✅ Summary
In this lab, you learned to:
- Create a Vault and encryption keys in OCI
- Rotate keys periodically for security
- Apply custom encryption keys to Boot and Block Volumes
- Use policies to enable secure key usage by OCI services
This setup enhances security by giving you full control over data encryption, ensuring compliance and better key lifecycle management.