You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
HashiCorp Vault Secret barrier encryption is based on ‘256-bit Advanced Encryption Standard (AES)’. This seems to be fixed one as per current support. Is there plan to make this configurable, in case any other encryption mechanism is needed?
Reference: Security Model | Vault | HashiCorp Developer 2
"The storage backends used by Vault are also untrusted by design. Vault uses a security barrier for all requests made to the backend. The security barrier automatically encrypts all data leaving Vault using a 256-bit Advanced Encryption Standard (AES) cipher in the Galois Counter Mode (GCM) with 96-bit nonces. The nonce is randomly generated for every encrypted object. When data is read from the security barrier, the GCM authentication tag is verified during the decryption process to detect any tampering.
HashiCorp Vault Secret barrier encryption is based on ‘256-bit Advanced Encryption Standard (AES)’. This seems to be fixed one as per current support. Is there plan to make this configurable, in case any other encryption mechanism is needed?
Reference: Security Model | Vault | HashiCorp Developer 2
"The storage backends used by Vault are also untrusted by design. Vault uses a security barrier for all requests made to the backend. The security barrier automatically encrypts all data leaving Vault using a 256-bit Advanced Encryption Standard (AES) cipher in the Galois Counter Mode (GCM) with 96-bit nonces. The nonce is randomly generated for every encrypted object. When data is read from the security barrier, the GCM authentication tag is verified during the decryption process to detect any tampering.
https://discuss.hashicorp.com/t/hashicorp-vault-secret-barrier-encryption-is-there-plan-to-make-it-configurable/70793/1
The text was updated successfully, but these errors were encountered: