Overview
Xloud protects data at every stage: in transit between services, at rest on storage backends, and during backup operations. Volume encryption uses LUKS with keys managed exclusively by Xloud Key Management (Barbican). Object storage supports server-side encryption. This page covers configuration for all data protection mechanisms available in the platform.Prerequisites
- Administrator role in Xloud Identity
- Xloud Key Management enabled (
enable_barbican: "yes"in XDeploy configuration) - For encrypted volumes: an encrypted volume type configured in Block Storage
- For object storage encryption: access to the object storage admin API
Data Protection Architecture
| Layer | Mechanism | Key Storage |
|---|---|---|
| Block volume (LUKS) | AES-256-XTS | Xloud Key Management |
| Ceph OSD at rest | AES-256-GCM | Ceph key management daemon |
| Object storage SSE | AES-256-CBC | Per-object or per-bucket keys |
| Database | MariaDB TDE or encrypted tablespace | External KMS |
| Backup | Inherited from volume encryption | Same key as source volume |
Volume Encryption (LUKS)
GA LUKS encryption wraps every I/O operation at the compute host before data reaches the storage network. The encryption key is fetched from Xloud Key Management at volume attachment time and is never written to disk on the compute host.Create an Encrypted Volume Type
- Dashboard
- CLI
Define encryption parameters
After creating the type, select View Encryption and click Create Encryption:
| Field | Value | Notes |
|---|---|---|
| Provider Class | nova.volume.encryptors.luks.LuksEncryptor | LUKS v2 encryptor |
| Control Location | front-end | Encryption at the compute host |
| Cipher | aes-xts-plain64 | AES-256 in XTS mode |
| Key Size | 256 | 256-bit AES key |
The volume type now shows Encrypted: Yes in the type list.
Key Management Integration (Barbican)
Xloud Key Management stores, rotates, and controls access to all encryption keys. Each encrypted volume has a unique key. Key access is audited and can be restricted by ACL.Key Operations
- CLI
- Dashboard
List secrets managed by Key Management
Retrieve key metadata (not the key material)
Create a named secret for application use
Set an ACL on a secret
Key Rotation
Rotate an encryption key (create new, re-encrypt)
Object Storage Encryption
Object storage encryption protects data at rest in the object store. Two modes are supported:| Mode | Description | Key Location |
|---|---|---|
| SSE-C | Customer-provided key sent per request | Client-managed |
| SSE-KMS | Keys managed by Xloud Key Management | Platform-managed |
Upload object with SSE-C encryption
With SSE-C, the client is responsible for storing and supplying the encryption key on every request. If the key is lost, the object is permanently unreadable. Use SSE-KMS for platform-managed key storage and rotation.
Encrypted Backups
Volume backups inherit the encryption state of their source volume. Backups of encrypted volumes are stored encrypted in the backup repository.Create encrypted backup
Verify backup encryption
Data-at-Rest Encryption for Databases
Platform databases (MariaDB) use encrypted tablespaces for sensitive configuration and credential storage. This is configured during deployment and does not require manual intervention.Enable database encryption (XDeploy configuration)
External KMS for database encryption
Secure Deletion and Data Scrubbing
When a volume is deleted, the underlying storage blocks are marked for reclamation. For regulatory compliance requiring secure deletion:Zero-fill a volume before deletion
For Ceph-backed storage, data scrubbing is performed at the storage layer through Ceph’s object deletion and PG scrub process. Immediately after deletion, the data may remain on OSDs until the next scrub cycle. For environments requiring immediate data erasure, use LUKS encryption — key deletion effectively renders the data unreadable without the scrub delay.
Next Steps
Key Manager Service
Detailed guide for storing and managing secrets in Xloud Key Management
Volume Encryption (Admin)
Administrative guide for volume encryption and volume type management
VM Security
vTPM, Secure Boot, and hypervisor-level protection for virtual machines
Compliance
Audit logging and compliance framework requirements for encrypted data