GCP Requirements for BYOK

To use GCP with BYOK, you must create a new unique service account user in your GCP account. Service account creation is on the Service Account page (IAM & Admin > Service Account).

  • Do not use an existing user account or existing access key. Create the service account with the following permissions see GCP BYOK Service Account Requirements.

  • Create an access key by logging in to GCP using the service account.

  • Do not use the access key more than one time.

  • Do not delete any access keys from the service account.

  • Do not attach the same GCP account to multiple Cryptographic Security Platform Vault clusters.

  • Do not share the GCP BYOK service account.

You must also be aware of the following endpoint requirements: 

  • If your organization restricts outbound access to the public internet, the following endpoints must be whitelisted for GCP BYOK to function correctly:

    • https://www.googleapis.com/auth/cloud-platform

    • https://oauth2.googleapis.com

    • https://cloudresourcemanager.googleapis.com

    • https://iam.googleapis.com

    • https://cloudkms.googleapis.com

    • https://accounts.google.com

  • If a proxy is in use in the network, these endpoints can be tested in the Cryptographic Security Platform Vault Appliance Management application on the Settings > Proxy Settings page.