-
Notifications
You must be signed in to change notification settings - Fork 356
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Is your feature request related to a problem? Please describe.
Currently (discussed under #3330) Polaris supports the "current" KMS keys ARN and a list of "allowed" keys ARNs. The same encrypt / decrypt access is granted to all of those ARNs in vended credential policies (STS session policies).
However, historical keys do not need the "encrypt" permission. Polaris and its clients normally need only the "decrypt" permission to read older data files.
Describe the solution you'd like
- Add new storage config property:
legacy-kms-keys - Grant only "decrypt" access to
legacy-kms-keys - Grant both "decrypt" and "encrypt" access to
allowed-kms-keys(current behaviour) - Deprecate the
current-kms-keyproperty (forward existing values toallowed-kms-keys)
During manual KMS key rotation, the admin user will add all keys that may be used for encryption to allowed-kms-keys. Then, the admin user will adjust AWS configuration, then move the decommissioned KMS key to the legacy-kms-keys list.
Describe alternatives you've considered
No response
Additional context
No response
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request