You need to upload files from your on-premises environment to Cloud Storage.
You want the files to be encrypted on Cloud Storage using customer-supplied encryption keys.
What should you do?
Click on the arrows to vote for the correct answer
A. B. C. D.A.
The correct answer is D. Use gsutil to create a bucket, and use the flag --encryption-key to supply the encryption key. Use gsutil to upload the files to that bucket.
Google Cloud Storage provides server-side encryption for data at rest by default, which means that all objects are encrypted when they are stored in Google Cloud Storage. However, if you want to use customer-supplied encryption keys to encrypt your data, you need to provide the encryption key when you upload the data.
To upload files from an on-premises environment to Cloud Storage and encrypt them using customer-supplied encryption keys, you can follow these steps:
Install and configure gsutil on your on-premises environment. You can download gsutil from the Google Cloud SDK website.
Create a Cloud Storage bucket. You can use the gsutil mb command to create a bucket. For example:
cssgsutil mb -p [PROJECT_ID] -c [STORAGE_CLASS] -l [LOCATION] -b on gs://[BUCKET_NAME]
where:
lessgsutil kms encryption -k [KEY_NAME] gs://[BUCKET_NAME]
where:
lessgsutil cp -k [LOCAL_FILE_PATH] gs://[BUCKET_NAME]/[OBJECT_NAME]
where:
The -k
flag is used to indicate that the file should be encrypted using the customer-supplied encryption key.
Option A is incorrect because the .boto configuration file is not used to supply the encryption key for customer-supplied encryption.
Option B is incorrect because the gcloud config command is not used to supply the encryption key for customer-supplied encryption.
Option C is incorrect because the --encryption-key flag is not used to set the encryption key for customer-supplied encryption. Instead, the gsutil kms command should be used to set the encryption key.