Documentation Index
Fetch the complete documentation index at: https://docs.xloud.tech/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Xloud protects data at every stage: in transit between services, at rest on storage backends, and during backup operations. Volume encryption uses LUKS with keys managed exclusively by Xloud Key Management (Barbican). Object storage supports server-side encryption. This page covers configuration for all data protection mechanisms available in the platform.Prerequisites
- Administrator role in Xloud Identity
- Xloud Key Management enabled (
enable_barbican: "yes"in XDeploy configuration) - For encrypted volumes: an encrypted volume type configured in Block Storage
- For object storage encryption: access to the object storage admin API
Data Protection Architecture
| Layer | Mechanism | Key Storage |
|---|---|---|
| Block volume (LUKS) | AES-256-XTS | Xloud Key Management |
| Ceph OSD at rest | AES-256-GCM | Ceph key management daemon |
| Object storage SSE | AES-256-CBC | Per-object or per-bucket keys |
| Database | MariaDB TDE or encrypted tablespace | External KMS |
| Backup | Inherited from volume encryption | Same key as source volume |
Volume Encryption (LUKS)
GA LUKS encryption wraps every I/O operation at the compute host before data reaches the storage network. The compute host fetches the encryption key from Xloud Key Management at volume attachment time and never writes it to disk.Create an Encrypted Volume Type
- Dashboard
- CLI
Define encryption parameters
After creating the type, select View Encryption and click Create Encryption:
| Field | Value | Notes |
|---|---|---|
| Provider Class | nova.volume.encryptors.luks.LuksEncryptor | LUKS v2 encryptor |
| Control Location | front-end | Encryption at the compute host |
| Cipher | aes-xts-plain64 | AES-256 in XTS mode |
| Key Size | 256 | 256-bit AES key |
The volume type now shows Encrypted: Yes in the type list.
Key Management Integration (Barbican)
Xloud Key Management stores, rotates, and controls access to all encryption keys. Each encrypted volume has a unique key. Key access is audited and can be restricted by ACL.Key Operations
- CLI
- Dashboard
List secrets managed by Key Management
Retrieve key metadata (not the key material)
Create a named secret for application use
Set an ACL on a secret
Key Rotation
Rotate an encryption key (create new, re-encrypt)
Object Storage Encryption
Object storage encryption protects data at rest in the object store. Two modes are supported:| Mode | Description | Key Location |
|---|---|---|
| SSE-C | Customer-provided key sent per request | Client-managed |
| SSE-KMS | Keys managed by Xloud Key Management | Platform-managed |
Upload object with SSE-C encryption
With SSE-C, the client is responsible for storing and supplying the encryption key on every request. If the key is lost, the object is permanently unreadable. Use SSE-KMS for platform-managed key storage and rotation.
Encrypted Backups
Volume backups inherit the encryption state of their source volume. Backups of encrypted volumes are stored encrypted in the backup repository.Create encrypted backup
Verify backup encryption
Data-at-Rest Encryption for Databases
Platform databases (MariaDB) use encrypted tablespaces for sensitive configuration and credential storage. XDeploy configures this during deployment, so you do not need manual intervention.Enable database encryption (XDeploy configuration)
External KMS for database encryption
Secure Deletion and Data Scrubbing
When a volume is deleted, the underlying storage blocks are marked for reclamation. For regulatory compliance requiring secure deletion:Zero-fill a volume before deletion
For Ceph-backed storage, the storage layer performs data scrubbing through Ceph’s object deletion and placement group (PG) scrub process. Immediately after deletion, the data may remain on OSDs until the next scrub cycle. For environments requiring immediate data erasure, use LUKS encryption. Deleting the key renders the data unreadable without waiting for the scrub cycle.
Next Steps
Key Manager Service
Detailed guide for storing and managing secrets in Xloud Key Management
Volume Encryption (Admin)
Administrative guide for volume encryption and volume type management
VM Security
vTPM, Secure Boot, and hypervisor-level protection for virtual machines
Compliance
Audit logging and compliance framework requirements for encrypted data