Creating a Cloud VM Set for the Cryptographic Security Platform Vault for Databases

A VM must be part of a Cloud VM Set before it can be used for Transparent Data Encryption (TDE) in a database.

Before You Begin 

Procedure 

  1. Log into the Cryptographic Security Platform Vault for Databases webGUI using an account with Cloud Admin privileges.
  2. In the top menu bar, click Workloads.
  3. Select Actions > Create New Cloud VM Set.
  4. On the VM Set tab:
    1. Enter a name for the Cloud VM Set.
    2. Select the group to which this set should belong, or accept the default.
    3. Optionally enter a description for the set.
  5. If you want to specify additional options, click the Additional Properties tab specify the options you want to use.

  6. If you want to specify when the VMs in the Cloud VM Set need to be re-authenticated, click the Reauthentication Settings tab and specify the options you want to use.

    Option

    Description

    Reauthentication on IP Change

    Whether a VM in the set must be re-authenticated when the VM's IP address changes. The default is No.

    If your system configuration uses DHCP or multiple NICs, do not set this option to Yes. If you do so, the VMs in the set may go into a reboot loop if their boot partitions are encrypted and any encrypted drives may be detached.

    Reauthentication on H/W Signature Change

    Whether a VM in the set must be re-authenticated if its MAC address or UUID changes.

    The options are:

    • Yes—If either the MAC address or the UUID changes, the VM requires reauthentication. This is the default. We recommend that you do not change this option.

    • Permissive—Both the MAC address and the UUID must change before the VM requires reauthentication. You can use this option if your system administrators are performing maintenance on the VMs in this Cloud VM Set that require changes to the network cards and hence to the MAC addresses of the VMs in the set. We recommend you reset this value to Yes once maintenance is finished.
    • No—The Cryptographic Security Platform Vault for Databases does not require reauthentication if VM's MAC address or UUID changes. We strongly recommend that you do not select this option. If you do, a cloned or misconfigured VM could gain access to the keys associated with the original VM.

      If you do select this option, you must confirm the selection before you can proceed. If Cryptographic Security Platform Vault for Databases detects multiple VMs with the same MAC address and UUID combination when hardware validation is off, Cryptographic Security Platform Vault for Databases generates an alert every 8 hours until the cloned VMs stop heartbeating or hardware authentication is set to Yes or Permissive. In addition, Cryptographic Security Platform Vault for Databases generates an alert when client operations, such as key access or device registration, occur on the cloned VMs.

    Reauthentication on Reboot

    Whether a VM in the set must be re-authenticated every time it reboots. The default is No.

    Setting this value to Yes is similar to requiring a boot-time password before the VM can come up completely.

  7. If you want to specify a key encryption key (KEK), click the Key Encryption Key tab, choose the type of Key Encryption Key Association, and then specify the required information.

    A KEK provides an extra layer of security by encrypting the individual data encryption keys on the VMs associated with this Cloud VM Set. It also controls the expiration and revocation of those data encryption keys. To protect the KEK, Cryptographic Security Platform Vault requires that the KEK be stored in the hardware security module (HSM) associated with this Cryptographic Security Platform Vault cluster. For more information, see KEKs with Cloud VM Sets.

    You can add the KEK during Cloud VM Set creation or at a later time.

    1. Determine whether Cryptographic Security Platform Vault for Databases creates a KEK for this Cloud VM Set. To use a KEK, select Use KEK from the drop-down list and click Save to view the KEK properties.

      If you do not make a selection, then the default value is No KEK Association is used, and the tab is not populated. If you decide you want to use a KEK, you can add the KEK to the Cloud VM Set later.

    2. Complete the required information for your choice: 

  8. When you have finished specifying the Cloud VM Set options, click Create.
  9. When you see the Cloud VM Set Successfully Created message, click Close.

What to Do Next 

Install the Policy Agent on the VM(s) where you want to use TDE and register it with Cryptographic Security Platform Vault.