ECS disks in this article refer to cloud disks and Shared Block Storage devices. They are referred to as ECS disks in the following contents, unless otherwise specified.
What is ECS disk encryption?
The ECS disk encryption feature allows you to encrypt new ECS disks so that you can meet encryption needs for scenarios such as certification requirements and business security. The ECS disk encryption feature means you do not have to create, maintain, or protect your own key management infrastructure, nor change any of your existing applications or maintenance processes. In addition, no extra encryption or decryption operations are required, making ECS disk encryption operations invisible to your applications or other operations.
Encryption and decryption processes hardly degrade ECS disk performance. For information on the performance testing method, see ~~25382~~#concept_ytm_vwj_ydb.
After an encrypted ECS disk is created and attached to an ECS instance, you can encrypt data that is:
- Stored directly on the ECS disk.
- Transmitted between the ECS disk and the instance. However, data in the instance operating system is not encrypted.
- Created from the encrypted ECS disk, such as snapshots. These snapshots are called encrypted snapshots.
Encryption and decryption are performed on the host that runs the ECS instance, so the data transmitted from the ECS instance to the cloud disk is encrypted.
ECS disk encryption supports all available cloud disks (Basic Cloud Disks, Ultra Cloud Disks, SSD Cloud Disks, and ESSDs) and shared block storage (Ultra Shared Block Storage and SSD Shared Block Storage).
ECS disk encryption supports all available instance types and is supported in all regions.
ECS disk encryption dependencies
ECS disk encryption is dependent on the Key Management Service (KMS), which must be in the same region. However, you do not need to perform any additional operations in the KMS console to activate ECS disk encryption.
The first time you use the ECS disk encryption function (such as when you are creating ECS instances or ECS disks), you must first authorize and activate KMS. Otherwise, you cannot create encrypted ECS disks or instances with encrypted disks.
The first time you encrypt a disk in a target region, Alibaba Cloud automatically creates a Customer Master Key (CMK) in the KMS region, exclusively for ECS. The CMK cannot be deleted. You can query the CMK in the KMS console.
Key management for ECS disk encryption
ECS disk encryption handles key management for you. Each new ECS disk is encrypted by using a unique 256-bit key (derived from the CMK). This key is also associated with all snapshots created from this ECS disk and any ECS disks subsequently created from these snapshots. These keys are protected by the key management infrastructure of Alibaba Cloud provided by KMS. This approach implements strong logical and physical security controls to prevent unauthorized access. Your data and the associated keys are encrypted based on the industry standard AES-256 algorithm.
You cannot change the CMK associated with encrypted ECS disks and snapshots.
The key management infrastructure of Alibaba Cloud conforms to the recommendations in (NIST) 800-57 and uses cryptographic algorithms that comply with the (FIPS) 140-2 standard.
Each Alibaba Cloud account has a unique CMK in each region. This key is separate from the data and is stored in a system protected by strict physical and logical security controls. Each encrypted disk and its snapshots use an encryption key that is unique to the specific disk. The encryption key is created from and encrypted by the CMK for the current user in the current region. The disk encryption key is only used in the memory of the host that runs your ECS instance. The key is never stored in plaintext in any permanent storage media (such as an ECS disk).
The ECS disk encryption features incur no additional fees.
The CMK that ECS creates for you in each region is a service key. It does not consume your master key quota in a given region, meaning no additional fees are incurred.
These operations include:
- Creating encrypted disks by calling ~~25499~~#CreateInstance or ~~25513~~#CreateDisk.
- Attaching an encrypted disk to an instance by calling ~~25515~~#AttachDisk.
- Detaching an encrypted disk from an instance by calling ~~25516~~#DetachDisk.
- Creating a snapshot by calling ~~25524~~#CreateSnapshot.
- Restoring a disk by calling ~~25520~~#ResetDisk.
- Re-initializing a disk by calling ~~25519~~#ReInitDisk.
Create an encrypted ECS disk
Currently, only cloud disks can be encrypted. You can create an encrypted cloud disk in the following ways:
Create a cloud disk as a data disk when creating an ECS instance or :
- Check Encrypted to create a encrypted blank cloud disk.
- Select an encrypted screenshot to create a cloud disk.
When using APIs or the CLI:
Convert unencrypted data to encrypted data
You cannot directly convert an unencrypted disk to an encrypted disk, or perform the converse operation.
You cannot convert a snapshot created from an unencrypted disk to an encrypted snapshot, or perform the converse operation.
Therefore, if you must switch the existing data from status unencrypted to encrypted, we recommend that you use the
rsync command in a Linux instance or the
robocopy command in a Windows instance to copy data from an unencrypted disk to a (new) encrypted disk.
Therefore, if you must switch the existing data from status encrypted to unencrypted, we recommend that you use the
rsync command in a Linux instance or the
robocopy command in a Windows instance to copy data from an encrypted disk to a (new) unencrypted disk .
ECS disk encryption has the following limits:
- You can only encrypt ECS disks, not local disks or ephemeral disks.
- You can only encrypt data disks, not system disks.
- You cannot directly convert existing unencrypted disks into encrypted disks.
- You cannot convert encrypted disks into unencrypted disks.
- You cannot convert unencrypted snapshots to encrypted snapshots.
- You cannot convert encrypted snapshots to unencrypted snapshots.
- You cannot share images created from encrypted snapshots.
- You cannot copy images created from encrypted snapshots across regions.
- You cannot export images created from encrypted snapshots.
- You cannot define CMKs for each region. They are generated by the system.
- The ECS system creates CMKs for each region. You cannot delete these keys, and you do not incur fees from them.
- After a cloud disk is encrypted, you cannot change the CMK used for encryption and decryption.