<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Take Control: Customer-Managed Keys for Lakebase Postgres in Announcements</title>
    <link>https://community.databricks.com/t5/announcements/take-control-customer-managed-keys-for-lakebase-postgres/m-p/155338#M752</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Lakebase Postgres now supports &lt;/SPAN&gt;&lt;STRONG&gt;customer‑managed keys (CMK)&lt;/STRONG&gt;&lt;SPAN&gt;, so security teams can keep encryption keys in their own cloud KMS (AWS KMS, Azure Key Vault, or Google Cloud KMS) while Databricks runs Lakebase as a managed service.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Key highlights&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Your keys, your KMS&lt;/STRONG&gt;&lt;SPAN&gt; – Use your own CMK in your cloud KMS instead of Databricks‑managed keys, keeping control of the root of trust for Lakebase Postgres.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;End‑to‑end protection&lt;/STRONG&gt;&lt;SPAN&gt; – Encrypt both long‑term Lakebase storage and ephemeral compute caches, not just database files, under the same CMK.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Cryptographic “kill switch”&lt;/STRONG&gt;&lt;SPAN&gt; – Using your CMK in KMS as a kill switch makes Lakebase data cryptographically inaccessible and terminates active compute, giving high‑compliance teams a technical failsafe.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Envelope encryption at scale&lt;/STRONG&gt;&lt;SPAN&gt; – Lakebase uses a CMK → KEK → DEK hierarchy, so your CMK never leaves KMS, while data keys can be rotated and managed without re‑encrypting all data.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Clear admin workflow&lt;/STRONG&gt;&lt;SPAN&gt; – Account admins register the CMK once, bind it to a workspace, and all Lakebase projects in that workspace inherit it; rotation and audit remain in your cloud provider.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;In the full post, you’ll see how Lakebase CMK combines Lakebase’s decoupled storage/compute architecture with customer‑owned keys to meet stricter data sovereignty and compliance requirements for Postgres workloads.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p8i6j01 paragraph"&gt;&lt;A style="background-color: #ff3621; color: white; padding: 10px 20px; text-decoration: none; border-radius: 5px; font-weight: bold; display: inline-block;" href="https://www.databricks.com/blog/take-control-customer-managed-keys-lakebase-postgres?utm_source=bambu&amp;amp;utm_medium=social&amp;amp;utm_campaign=advocacy" target="_blank" rel="noopener"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt;&amp;nbsp;Read the full post here&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_left:"&gt;👈&lt;/span&gt;&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Apr 2026 13:38:30 GMT</pubDate>
    <dc:creator>Tushar_Parekar</dc:creator>
    <dc:date>2026-04-23T13:38:30Z</dc:date>
    <item>
      <title>Take Control: Customer-Managed Keys for Lakebase Postgres</title>
      <link>https://community.databricks.com/t5/announcements/take-control-customer-managed-keys-for-lakebase-postgres/m-p/155338#M752</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Lakebase Postgres now supports &lt;/SPAN&gt;&lt;STRONG&gt;customer‑managed keys (CMK)&lt;/STRONG&gt;&lt;SPAN&gt;, so security teams can keep encryption keys in their own cloud KMS (AWS KMS, Azure Key Vault, or Google Cloud KMS) while Databricks runs Lakebase as a managed service.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Key highlights&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Your keys, your KMS&lt;/STRONG&gt;&lt;SPAN&gt; – Use your own CMK in your cloud KMS instead of Databricks‑managed keys, keeping control of the root of trust for Lakebase Postgres.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;End‑to‑end protection&lt;/STRONG&gt;&lt;SPAN&gt; – Encrypt both long‑term Lakebase storage and ephemeral compute caches, not just database files, under the same CMK.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Cryptographic “kill switch”&lt;/STRONG&gt;&lt;SPAN&gt; – Using your CMK in KMS as a kill switch makes Lakebase data cryptographically inaccessible and terminates active compute, giving high‑compliance teams a technical failsafe.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Envelope encryption at scale&lt;/STRONG&gt;&lt;SPAN&gt; – Lakebase uses a CMK → KEK → DEK hierarchy, so your CMK never leaves KMS, while data keys can be rotated and managed without re‑encrypting all data.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Clear admin workflow&lt;/STRONG&gt;&lt;SPAN&gt; – Account admins register the CMK once, bind it to a workspace, and all Lakebase projects in that workspace inherit it; rotation and audit remain in your cloud provider.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;In the full post, you’ll see how Lakebase CMK combines Lakebase’s decoupled storage/compute architecture with customer‑owned keys to meet stricter data sovereignty and compliance requirements for Postgres workloads.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p8i6j01 paragraph"&gt;&lt;A style="background-color: #ff3621; color: white; padding: 10px 20px; text-decoration: none; border-radius: 5px; font-weight: bold; display: inline-block;" href="https://www.databricks.com/blog/take-control-customer-managed-keys-lakebase-postgres?utm_source=bambu&amp;amp;utm_medium=social&amp;amp;utm_campaign=advocacy" target="_blank" rel="noopener"&gt;&lt;span class="lia-unicode-emoji" title=":link:"&gt;🔗&lt;/span&gt;&amp;nbsp;Read the full post here&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":backhand_index_pointing_left:"&gt;👈&lt;/span&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2026 13:38:30 GMT</pubDate>
      <guid>https://community.databricks.com/t5/announcements/take-control-customer-managed-keys-for-lakebase-postgres/m-p/155338#M752</guid>
      <dc:creator>Tushar_Parekar</dc:creator>
      <dc:date>2026-04-23T13:38:30Z</dc:date>
    </item>
  </channel>
</rss>

