Overview
Customer-Managed Keys (CMK) provide enhanced security for your Entegrata instance by allowing you to control the encryption keys used to protect your data in Azure. With CMK, you maintain ownership and control over the cryptographic keys, meeting compliance requirements and providing additional security layers beyond Azure’s default encryption.CMK implementation requires uploading PEM-formatted encryption keys to your Entegrata instance. The system monitors key expiration and provides visual alerts to ensure continuous data protection.
Why Use Customer-Managed Keys?
Enhanced Security Control
Your Keys, Your Control:
- You generate and own the encryption keys
- Keys never leave your control during generation
- You decide when to rotate or revoke keys or let Entegrata rotate them yearly by default
- Independent from cloud provider’s key management
Flexibility in Key Management
Rotate encryption keys on demandto meet security policies and compliance requirements or yearly by default.
Immediately revoke access by removing keys, providing an additional security control in breach scenarios.
Understanding CMK Status
Status Badge Colors
The CMK card displays color-coded badges indicating key expiration status for quick assessment:🔴 Red Badge - Key expires in less than 1 day (immediate action required🟡 Yellow Badge - Key expires in less than 7 days (plan key rotation soon🔵 Blue Badge - Key expires in less than 30 days (schedule key rotation🟢 Green Badge - Key valid for 30+ days (no immediate action needed)
Generating a PEM Key File
Prerequisites
Before generating a CMK, ensure you have:- OpenSSL installed on your system (or access to key generation tools)
- Secure key storage for backup copies
- Documentation process for tracking key generation
Using OpenSSL to Generate Keys
Generate Private Key
Generate a 4096-bit RSA private key:
The 4096-bit key length provides strong encryption suitable for most compliance requirements. You can use 2048-bit for basic needs or 8192-bit for maximum security.
Key Generation Best Practices
Uploading a Customer-Managed Key
File Format Requirements
PEM File Requirements:
- File extension:
.pem - Format: Privacy Enhanced Mail (PEM) encoded
- Key type: RSA private key
- Minimum key length: 2048 bits (4096 bits recommended)
- Character encoding: ASCII/UTF-8
- No password protection on the key file
Upload Process
Access CMK Management
Navigate to Instance Settings and click Manage Data Encryption on the CMK card.
Select PEM File
Click Choose File or Select PEM File button to open the file browser.
Only files with
.pem extension are accepted. Other file types will be rejected.During Upload Process
What Happens During Upload
The CMK upload process involves several backend operations:- File Validation - System verifies PEM format and key strength
- Secure Transfer - Key is sent to Delegator Container App via Service Bus
- Customer Environment Processing - Key is stored in your Azure subscription
- Key Vault Update - Azure Key Vault is configured with the new CMK
- Infrastructure Update - Pulumi applies configuration changes
- Encryption Migration - Data encryption keys are re-encrypted with new CMK
- Status Update - System records new expiration date and status
CMK Expiration and Renewal
Why Key Expiration Matters
Encryption keys should be rotated regularly to:- Minimize exposure from potential key compromise
- Meet compliance requirements mandating periodic key rotation
- Reduce cryptographic risk from long-term key usage
- Maintain security posture with current best practices
Most compliance frameworks (SOC 2, ISO 27001, PCI-DSS) require key rotation at least annually. Many organizations implement yearly rotation schedules for sensitive data.
Key Rotation Before Expiry
Expired Key Recovery
Recovery steps for expired keys:- Immediate action - Generate and upload a new key as quickly as possible
- Service verification - Test critical services after new key is deployed
- Root cause analysis - Document why expiration occurred
- Process improvement - Adjust monitoring and rotation schedules to prevent recurrence
Best Practices for Key Management
Key Generation and Storage
Secure Key Handling
- Generate offline - Create keys on secure, non-networked systems when possible
- Encrypted backups - Store backup copies in encrypted archives
- Access control - Limit key access to authorized security personnel only
- Audit logging - Document all key generation, access, and rotation activities
- Physical security - Store backup keys in secure physical locations (safes, vaults)
Key Lifecycle Management
Multi-Person Approval
Troubleshooting
Common Upload Errors
Invalid File Format
Invalid File Format
Error: “The uploaded file is not a valid PEM file”Solutions:
- Verify the file has
.pemextension - Ensure the file contains
-----BEGIN RSA PRIVATE KEY-----header - Check that the key is not password-protected
- Regenerate the key using OpenSSL if format is uncertain
- Verify no corruption occurred during file transfer
Key Length Too Short
Key Length Too Short
Error: “Key length does not meet minimum security requirements”Solutions:
- Generate a new key with at least 2048-bit length
- Recommended: Use 4096-bit keys for enhanced security
- Verify key properties with:
openssl rsa -in key.pem -text -noout
Upload Timeout
Upload Timeout
Error: “Upload operation timed out”Solutions:
- Check your internet connection
- Verify no firewall or proxy is blocking the upload
- Try uploading again during off-peak hours
- Contact Entegrata support if timeouts persist
Infrastructure Transitioning
Infrastructure Transitioning
Error: “Cannot upload CMK while infrastructure is transitioning”Solutions:
- Wait for current infrastructure operations to complete
- Check if other administrators are making instance changes
- Monitor the infrastructure status on the loading screen
- Try upload again after status returns to IDLE
File Size Too Large
File Size Too Large
Error: “File exceeds maximum allowed size”Solutions:
- Ensure you’re uploading only the private key, not a certificate chain
- Verify the file contains only the key, no extra content
- Standard PEM keys should be under 10KB
Deployment Stuck in Transitioning
- Do not close browser - Keep the page open to monitor progress
- Check infrastructure status - Review any error messages on loading screen
- Wait for timeout - System may still be processing
- Contact support - If stuck beyond 60 minutes, contact Entegrata support
- Provide details - Share upload timestamp, file details, and any error messages
Data Access Issues After Upload
If you experience data access problems after CMK upload:- Verify upload success - Confirm green status badge appears
- Check expiration date - Ensure new expiration date is displayed
- Test specific services - Identify which services are affected
- Review error logs - Check application logs for encryption errors
- Contact support immediately - CMK issues may require backend intervention
