AnalyticDB for MySQL provides the disk encryption feature. This feature encrypts the data on each disk in your cluster based on block storage. This way, your data cannot be decrypted even if it is leaked.
Features
- All data in reserved clusters
- Hot data in elastic clusters
Note Cold data in elastic clusters is not stored on disks and cannot be encrypted within elastic clusters.
- Data that is transmitted between disks and clusters
- All snapshots of the encrypted disk, which are classified as encrypted snapshots
Precautions
- Disk encryption can be enabled for an AnalyticDB for MySQL cluster when you first create the cluster. You cannot enable this feature after the cluster is created.
- Disk encryption cannot be disabled after it is enabled.
- After disk encryption is enabled, both the snapshots generated from reserved clusters and the reserved clusters created from those snapshots are automatically encrypted.
- If you enable disk encryption, the read and write performance of the cluster is affected. Typically, the read and write performance is reduced by about 10%.
- You do not need to modify the code to allow access to the services.
Pricing
Disk encryption requires the use of Key Management Service (KMS). You are charged for key management and API calls in KMS. For more information, see Billing.
Method to enable disk encryption
Disk encryption can be enabled only when you create an AnalyticDB for MySQL cluster. For more information, see Create a cluster. To enable disk encryption, you must specify the related parameters on the cluster buy page.