[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eGoogle Distributed Cloud (GDC) air-gapped appliance encrypts all customer content stored at rest by default.\u003c/p\u003e\n"],["\u003cp\u003eThe GDC air-gapped appliance storage layer uses dm-crypt with the Linux Unified Key Setup (LUKS) extension for encryption.\u003c/p\u003e\n"],["\u003cp\u003eBlock and object encryption are available to provide double encryption for increased security.\u003c/p\u003e\n"],["\u003cp\u003eData in transit is encrypted, using a secure mode for internal data and FIPS-compliant OpenSSL for external communication.\u003c/p\u003e\n"]]],[],null,["# Data encryption\n\n| **Important:** To access the URLs on this page, you must connect to the internet. The URLs are provided for use when you have such access.\n\nThis section describes the different layers of encryption in storage. Google Distributed Cloud (GDC) air-gapped appliance\n\n\nEncryption at rest\n------------------\n\nThere are different layers of data at rest encryption that GDC air-gapped appliance provides.\n\n\nEncryption in transit\n---------------------\n\nData in transit is encrypted using IPsec on two types of OTS traffic:\n\n- External traffic between bare metal hosts and OTS Storage Virtual Machines (SVMs).\n- Internal traffic between OTS worker nodes.\n\nThe IPsec on both traffic is implemented by the third party library strongSwan (\u003chttps://strongswan.org/\u003e). The OTS internal traffic is built with the OpenVSwitch vxlan tunnel and it also uses strongSwan to encrypt the data flow under the layer."]]