Creating a Cloud VM Set for the KeyControl Vault for VM Encryption

A VM must be part of a Cloud VM Set before it can be encrypted. The set controls global options for the VMs it contains. It also allows you to enable the BoundaryControl feature that uses Policy Rules and constraints in Entrust CloudControl to authenticate and authorize delivery of encryption keys for the data encrypted by the Entrust KeyControl Policy Agent and managed by KeyControl Vault for VM Encryption.

Before You Begin 

  • If you want to use a Key Encryption Key (KEK) with the Cloud VM Set, KeyControl Vault for VM Encryption must have access to a hardware security module (HSM) in which it can store the KEK. For more information, see KEKs with Cloud VM Sets and Hardware Security Modules with KeyControl.

  • If you are using the BoundaryControl feature, make sure you know the URL or IP address of the CloudControl server you want to use. A link between KeyControl and the CloudControl server must already be established before you can use it in the Cloud VM Set. For details about establishing the link, see Linking KeyControl with CloudControl.

    Important: You cannot change whether the BoundaryControl feature is enabled or disabled after you have created the Cloud VM Set. If you do not select a CloudControl server link during this procedure, you cannot go back and add one. Conversely, if you do select a link you cannot go back and disable BoundaryControl later.

Procedure 

  1. Log into the KeyControl Vault for VM Encryption using an account with Cloud Admin privileges.
  2. In the top menu bar, click Workloads.
  3. Select Actions > Create New Cloud VM Set.
  4. On the VM Set tab:
    1. Enter a name for the Cloud VM Set.
    2. Select the group to which this set should belong, or accept the default.
    3. Optionally enter a description for the set.
    4. If you want to use the BoundaryControl feature, select the CloudControl app server link that you want to use from the drop-down list. You can change the server link after you save the Cloud VM Set but you cannot enable BoundaryControl later if you do not select a server at this point.

  5. If you want to specify additional options, click the Additional Properties tab specify the options you want to use.

  6. If you want to specify when the VMs in the Cloud VM Set need to be re-authenticated, click the Reauthentication Settings tab and specify the options you want to use.

  7. If you want to specify a key encryption key (KEK), click the Key Encryption Key tab, choose the type of Key Encryption Key Association, and then specify the required information.

    A KEK provides an extra layer of security by encrypting the individual data encryption keys on the VMs associated with this Cloud VM Set. It also controls the expiration and revocation of those data encryption keys. To protect the KEK, KeyControl requires that the KEK be stored in the hardware security module (HSM) associated with this KeyControl cluster. For more information, see KEKs with Cloud VM Sets.

    You can add the KEK during Cloud VM Set creation or at a later time.

    1. Determine whether KeyControl Vault for VM Encryption creates a KEK for this Cloud VM Set. To use a KEK, select Use KEK from the drop-down list and click Save to view the KEK properties.

      If you do not make a selection, then the default value is No KEK Association is used, and the tab is not populated. If you decide you want to use a KEK, you can add the KEK to the Cloud VM Set later.

    2. Complete the required information for your choice: 

  8. If you want the VMs in this Cloud VM Set to use a Single Encryption Key (SEK), click the Single Encryption Key tab specify the required information.

    If you enable this option, all the VMs registered with the Cloud VM Set will be encrypted with the same encryption key, and the key's expiry date and expiration option will be set at the Cloud VM Set level instead of at the disk level. Using a SEK enables data deduplication because identical blocks at the same offset will be encrypted with the same key and will therefore still be identical after encryption. For details, see Data Deduplication with Cloud VM Sets.

  9. When you have finished specifying the Cloud VM Set options, click Create.
  10. When you see the Cloud VM Set Successfully Created message, click Close.

What to Do Next 

Install the Policy Agent on the VM(s) you want to encrypt and register it with KeyControl.