[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-04 UTC。"],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped appliance encrypts all customer content stored at rest by default.\u003c/p\u003e\n"],["\u003cp\u003eThe GDC air-gapped appliance storage layer uses dm-crypt with the Linux Unified Key Setup (LUKS) extension for encryption.\u003c/p\u003e\n"],["\u003cp\u003eBlock and object encryption are available to provide double encryption for increased security.\u003c/p\u003e\n"],["\u003cp\u003eData in transit is encrypted, using a secure mode for internal data and FIPS-compliant OpenSSL for external communication.\u003c/p\u003e\n"]]],[],null,["# Data encryption\n\n| **Important:** To access the URLs on this page, you must connect to the internet. The URLs are provided for use when you have such access.\n\nThis section describes the different layers of encryption in storage. Google Distributed Cloud (GDC) air-gapped appliance\n\n\nEncryption at rest\n------------------\n\nThere are different layers of data at rest encryption that GDC air-gapped appliance provides.\n\n\nEncryption in transit\n---------------------\n\nData in transit is encrypted using IPsec on two types of OTS traffic:\n\n- External traffic between bare metal hosts and OTS Storage Virtual Machines (SVMs).\n- Internal traffic between OTS worker nodes.\n\nThe IPsec on both traffic is implemented by the third party library strongSwan (\u003chttps://strongswan.org/\u003e). The OTS internal traffic is built with the OpenVSwitch vxlan tunnel and it also uses strongSwan to encrypt the data flow under the layer."]]