Managing key rotations with GCP_KMS with BYOK solution

286 views Asked by At

We have RSA key pairs generated on on-prem and plan to sync them to GCP-KMS. There is an yearly key rotation policy which would be done on on-prem and new key_versions would be synced to KMS. My concern is with the KMS API.

Problem: The API always asks for the 'key_version' as an argument to encrypt/decrypt a file.

Desired behaviour: During decryption, is it not possible that the KMS sees the certificate thumbprint and returns the appropriate key version to decrypt a given encrypted file? e.g. a DEK wrapped with the RSA_public when supplied to KMS gets decrypted by the RSA_Private(or KEK) of the correct version.

If yes, is there any documentation that elaborates on this use case?

1

There are 1 answers

1
guillaume blaquiere On BEST ANSWER

According to the documentation, you can achieve that with symmetric signature (no key version specified), but you can't with the asymetricDecrypt (key version is required in the URL path of the API)