Updating File System Encryption

File Storage with Lustre file systems use Oracle-managed keys to encrypt a file system by default, which leaves all encryption-related matters to Oracle. Optionally, you can encrypt the data in a file system using your own Vault encryption key.

To encrypt a file system with your own key, ensure that at least one key vault and key in the Vault service. For more information, see Overview of Vault.

Caution

Be sure to back up vaults and keys. Deleting a vault and key otherwise means losing the ability to decrypt any resource or data that the key was used to encrypt. For more information, see Backing Up and Restoring Vaults and Keys.

Required IAM Policy

File systems encrypted using your own key require the ability to read keys stored in Vault. File Storage with Lustre uses service principals to grant access to the Vault key.

Create IAM policies that give the services and users access to Vault keys:

allow service blockstorage to use keys in compartment <key_compartment_name> where target.key.id='<OCID_of_key>'
allow service lustrefs to use key-delegate in compartment <key_compartment_name> where target.key.id='<OCID_of_key>'
allow service lustrefs to read keys in compartment <key_compartment_name> where target.key.id='<OCID_of_key>'
allow group <user-group> to use key-delegate in compartment <key_compartment_name> where target.key.id='<OCID_of_key>'

For more information, see File Storage with Lustre Policies.