cancel
Showing results forย 
Search instead forย 
Did you mean:ย 
Announcements
Stay up-to-date with the latest announcements from Databricks. Learn about product updates, new features, and important news that impact your data analytics workflow.
cancel
Showing results forย 
Search instead forย 
Did you mean:ย 

Take Control: Customer-Managed Keys for Lakebase Postgres

Tushar_Parekar
Databricks Employee
Databricks Employee

Lakebase Postgres now supports customerโ€‘managed keys (CMK), so security teams can keep encryption keys in their own cloud KMS (AWS KMS, Azure Key Vault, or Google Cloud KMS) while Databricks runs Lakebase as a managed service.

Key highlights

  • Your keys, your KMS โ€“ Use your own CMK in your cloud KMS instead of Databricksโ€‘managed keys, keeping control of the root of trust for Lakebase Postgres.
  • Endโ€‘toโ€‘end protection โ€“ Encrypt both longโ€‘term Lakebase storage and ephemeral compute caches, not just database files, under the same CMK.
  • Cryptographic โ€œkill switchโ€ โ€“ Using your CMK in KMS as a kill switch makes Lakebase data cryptographically inaccessible and terminates active compute, giving highโ€‘compliance teams a technical failsafe.
  • Envelope encryption at scale โ€“ Lakebase uses a CMK โ†’ KEK โ†’ DEK hierarchy, so your CMK never leaves KMS, while data keys can be rotated and managed without reโ€‘encrypting all data.
  • Clear admin workflow โ€“ Account admins register the CMK once, bind it to a workspace, and all Lakebase projects in that workspace inherit it; rotation and audit remain in your cloud provider.

In the full post, youโ€™ll see how Lakebase CMK combines Lakebaseโ€™s decoupled storage/compute architecture with customerโ€‘owned keys to meet stricter data sovereignty and compliance requirements for Postgres workloads.

๐Ÿ”— Read the full post here ๐Ÿ‘ˆ

0 REPLIES 0