cancel
Showing results forย 
Search instead forย 
Did you mean:ย 
Lakebase Articles
A structured knowledge hub for Lakebase. Find in-depth technical content, how-to guides, and reference material to support your development and learning journey.
cancel
Showing results forย 
Search instead forย 
Did you mean:ย 

Take Control: Customer-Managed Keys for Lakebase Postgres

Tushar_Parekar
Databricks Employee
Databricks Employee

Lakebase Postgres now supports customerโ€‘managed keys (CMK), so security teams can keep encryption keys in their own cloud KMS (AWS KMS, Azure Key Vault, or Google Cloud KMS) while Databricks runs Lakebase as a managed service.

Key highlights

  • Your keys, your KMS โ€“ Use your own CMK in your cloud KMS instead of Databricksโ€‘managed keys, keeping control of the root of trust for Lakebase Postgres.
  • Endโ€‘toโ€‘end protection โ€“ Encrypt both longโ€‘term Lakebase storage and ephemeral compute caches, not just database files, under the same CMK.
  • Cryptographic โ€œkill switchโ€ โ€“ Using your CMK in KMS as a kill switch makes Lakebase data cryptographically inaccessible and terminates active compute, giving highโ€‘compliance teams a technical failsafe.
  • Envelope encryption at scale โ€“ Lakebase uses a CMK โ†’ KEK โ†’ DEK hierarchy, so your CMK never leaves KMS, while data keys can be rotated and managed without reโ€‘encrypting all data.
  • Clear admin workflow โ€“ Account admins register the CMK once, bind it to a workspace, and all Lakebase projects in that workspace inherit it; rotation and audit remain in your cloud provider.

In the full post, youโ€™ll see how Lakebase CMK combines Lakebaseโ€™s decoupled storage/compute architecture with customerโ€‘owned keys to meet stricter data sovereignty and compliance requirements for Postgres workloads.

๐Ÿ”— Read the full post here ๐Ÿ‘ˆ

0 REPLIES 0