Can we directly create encrypted volume from unencrypted snapshot in aws

0

I want to ask can we create an encrypted volume from an unencrypted snapshot in aws? I have found documentation which says we should copy the unencrypted snapshot to encrypted snapshot and then create a volume from the encrypted snasphot. Is it necessary to do the copy snapshot step?

I can create the encrypted volume from unencrypted snapshot directly without copying unecrypted snaphot to encrypted snaphot first. Can someone verify that this approach is valid as well? I am using default EBS encryption key to encrypt my volume.

질문됨 일 년 전402회 조회
2개 답변
1

FYI, "New EBS volumes that are created from encrypted snapshots are automatically encrypted. You can also encrypt a volume on-the-fly while restoring it from an unencrypted snapshot. Encrypted volumes can only be attached to instance types that support EBS encryption."

Reference: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-creating-volume.html

AWS
AntAWS
답변함 일 년 전
0

I don't think copy snapshot step is necessary. Can you share the documentation you are referring to? Here is the documentation regarding "creating an encrypted volumes from an unencrypted snapshot": https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html

How EBS encryption works when the snapshot is unencrypted

  • When you create an encrypted volume from unencrypted snapshot, Amazon EC2 works with AWS KMS to encrypt and decrypt your EBS volumes as follows:
  • Amazon EC2 sends a CreateGrant request to AWS KMS, so that it can encrypt the volume that is created from the snapshot.
  • Amazon EC2 sends a GenerateDataKeyWithoutPlaintext request to AWS KMS, specifying the KMS key that you chose for volume encryption.
  • AWS KMS generates a new data key, encrypts it under the KMS key that you chose for volume encryption, and sends the encrypted data key to Amazon EBS to be stored with the volume metadata.
  • Amazon EC2 sends a Decrypt request to AWS KMS to get the encryption key to encrypt the volume data.
  • When you attach the encrypted volume to an instance, Amazon EC2 sends a CreateGrant request to AWS KMS, so that it can decrypt the data key.
  • When you attach the encrypted volume to an instance, Amazon EC2 sends a Decrypt request to AWS KMS, specifying the encrypted data key.
  • AWS KMS decrypts the encrypted data key and sends the decrypted data key to Amazon EC2.
  • Amazon EC2 uses the plaintext data key in hypervisor memory to encrypt disk I/O to the volume. The plaintext data key persists in memory as long as the volume is attached to the instance.
profile pictureAWS
전문가
답변함 일 년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠