Configuring vSAN encryption using Fortanix KMS
To encrypt data at rest using vSAN encryption, one option is to use the Fortanix Key Management Service (KMS).
Before you begin
- Create a Google Cloud project or use an existing one.
- Verify that you have at least three
n1-standard-4
or higher virtual machine (VM) instances.
Deploy Fortanix KMS on Google Cloud
Create a VPC network
For security purposes, create a new Virtual Private Cloud (VPC) network. You can control who has access by adding firewall rules or by using another access control method. If your project has a default VPC network, don't use it. Instead, create your own VPC network with a different subnet IP range so that the only firewall rules in effect are those that you create explicitly.
Create a VM instance template
- Follow the steps in Creating instance templates to create a new instance template.
- Under Machine type, select n1-standard-4 (4 vCPU, 15GB memory) or
higher.
- In the Boot disk field, select Ubuntu 16.04 LTS + 200GB SSD.
Create a managed instance group
Using the steps in Creating managed instance groups, create a managed instance group that uses the instance template you created in the previous step.
- Disable autoscaling.
- Under Number of instances, enter the number of Fortanix KMS cluster nodes you want.
Create a health check
On the Create a health check page, check for port 443. Click Create to create a health check.
Create an internal TCP load balancer
- On the Create a load balancer page, under the Internal facing or internal only field, select Only between my VMs.
- Click Continue to create a new internal load balancer.
- Select Backend configuration in the left panel.
- Select the new VPC network that you created.
- Select the managed instance group that you created.
- In the left panel, select Frontend configuration.
- Select the new VPC network that you created.
- Under Internal IP, reserve an internal IP address.
- Under Port number, expose ports 443, 4445, and 5696.
Create an external load balancer
- On the Create a load balancer page, under Internal facing or internal only, select From internet to my VMs.
- Click Continue.
- In the left panel, select Backend configuration.
- Select the Region.
- Select the managed instance group that you created.
- Select the health check that you created.
- In the left panel, select Frontend configuration.
- Select the VPC network that you created.
- Reserve a public IP address in the IP field.
- Under Port number, expose ports 443, 4445, and 5696.
Add a firewall rule
By default, the implied deny ingress VPC network firewall rule blocks unsolicited incoming connections to VMs in the VPC network.
To allow incoming connections, set up a firewall rule for your VM. After an incoming connection is established with a VM, traffic is permitted in both directions over that connection.
You can create a firewall rule to allow external access to specified ports, or to restrict access between VMs on the same network.
Add a firewall rule to allow the ports 443, 4445, and 5696. Select the VPC network you created and restrict the source IP, based on your security requirements.
Create a DNS
You can create a DNS for internal and external load balancers by using
Cloud DNS. On this page, sdkms.vpc.gcloud
is the
endpoint of the Fortanix KMS that's reachable from the VPC
network and sdkms.external.gcloud
is the endpoint that's reachable from the
internet.
Download and install Fortanix KMS
Install the Fortanix KMS software on each VM instance. For instructions, see the Fortanix Self-Defending KMS installation guide. For the installation package compatible with Google Cloud, contact Fortanix Support.
Configure UI/KMIP access
The UI can be accessed by using the sdkms.external.gcloud
command. The Key
Management Interoperability Protocol (KMIP) for VMware can be accessed by using
sdkms.vpc.gcloud
.
Set up private services access
Set up private services access to VMware Engine and connect your VPC network to your private cloud. For instructions, see Setting up private services access.
Establish trust between vCenter and Fortanix KMS
- In Fortanix KMS, configure a new app.
- In the Applications page, click View credentials for the app that you just created. Then, select the Username/Password tab and note the username and password to configure KMS in vCenter.
- In vCenter under Key Management Servers, configure internal IP
sdkms.vpc.gcloud
. - Make vCenter trust Fortanix KMS:
- In the vCenter Configure tab, click the listed Fortanix KMS.
- Click Establish trust, then click Make vCenter trust KMS.
- Click Trust.
- Make Fortanix KMS trust vCenter:
- Click Establish trust, then click Make KMS trust vCenter.
- Under Choose a method, click vCenter certificate.
- Under Download vCenter certificate, click Download, then click Done.
- Enable vSAN encryption.
- In the vSphere client, go to Cluster > vSAN > Services.
- Enable vSAN encryption.
Fortanix KMS is ready for use with vSAN encryption and vCenter VM encryption. A tamper-proof audit log captures all the crypto operations performed by the application. For VSAN encryption, new security keys are created in Fortanix KMS using the KMIP protocol.