Skip to main content

Overview

Volume encryption provides transparent at-rest protection for block storage data. Encryption is configured per volume type — all volumes created from an encrypted type are automatically encrypted without any additional action from you. Encryption keys are managed by the Xloud Key Management service and retrieved at volume attach time by the volume service, ensuring keys are never stored on the compute node’s disk.
Administrator Access Required — This operation requires the admin role. Contact your Xloud administrator if you do not have sufficient permissions.
Disk encryption is enabled through the XDeploy Configuration panel:

Enable KMS first

Navigate to XDeploy → Configuration → Advance Features and ensure Enable KMS is set to Yes. Disk encryption requires the Xloud Key Management service to store and manage encryption keys.

Enable Disk Encryption

On the same Advance Features tab, set Enable Disk Encryption to Yes.

Save and deploy

Click Save Configuration, then navigate to XDeploy → Operations and run a Deploy or Reconfigure for the Block Storage and Key Management services.
Disk encryption is enabled. Create encrypted volume types to apply encryption to new volumes.
KMS must be fully deployed and accessible from all compute nodes before enabling disk encryption. If KMS is unreachable, encrypted volume attach operations will fail.
Prerequisites
  • Administrator credentials with the admin role
  • Xloud Key Management service deployed and accessible
  • At least one unencrypted volume type to apply encryption to (or create a new type)
  • All compute nodes must be able to reach the Key Management service API

Encryption Architecture

ComponentRole
Block Storage APICreates volume with encryption metadata; requests key from KMS
Key Management ServiceGenerates and stores the encryption key; returns it at attach time
Volume ServiceProvisions the volume on the backend with encryption metadata
Hypervisor (dm-crypt)Applies LUKS encryption/decryption at the block device layer

Configure Volume Type Encryption

Encryption settings cannot be added to or removed from a volume type that already has volumes. Create a new encrypted volume type and migrate existing volumes if encryption is required on previously unencrypted data.

Select the volume type to encrypt

Log in to the Xloud Dashboard (https://connect.<your-domain>) and navigate to Admin → Volumes → Volume Types. Click the volume type name to open its details page.

Create encryption settings

Click Create Encryption. Configure the parameters:
FieldRecommended ValueDescription
ProviderLuksEncryptorLUKS-based encryption via dm-crypt
Cipheraes-xts-plain64AES-XTS — FIPS-compatible, hardware-accelerated
Key Size256Key length in bits (256 for AES-256)
Control Locationfront-endEncryption applied at the hypervisor layer
Click Create Volume Type Encryption.
aes-xts-plain64 with a 256-bit key provides AES-256 encryption. This cipher is hardware-accelerated on all modern CPUs (AES-NI) and meets FIPS 140-2 requirements when combined with a FIPS-validated key management service.

Verify encryption is active

The volume type details page now shows an encryption configuration block. All new volumes created from this type will be encrypted automatically.
Volume type encryption configured — all new volumes of this type are encrypted at rest.

Test Encryption

Verify that encryption is working end-to-end by creating and attaching a test volume:

Create an encrypted volume

Create test encrypted volume
openstack volume create \
  --size 10 \
  --type ssd-encrypted \
  test-encrypted-volume

Attach to an instance

Attach encrypted volume
openstack server add volume <instance-id> test-encrypted-volume

Verify LUKS inside the instance

SSH into the instance and check the block device:
Check LUKS header
sudo cryptsetup isLuks /dev/vdb && echo "LUKS encrypted" || echo "Not encrypted"
Device reports LUKS encryption — volume is encrypted at rest.

Clean up

Detach and delete test volume
openstack server remove volume <instance-id> test-encrypted-volume
openstack volume delete test-encrypted-volume

Key Management Dependency

Encryption key loss means the volume data is permanently inaccessible — there is no recovery path without the key. Before enabling volume encryption in production, ensure the Xloud Key Management service is:
  • Deployed in a high-availability configuration
  • Backed up regularly (key database backup)
  • Accessible from all compute nodes that may attach encrypted volumes
If the Key Management service is unavailable, attaching an encrypted volume will fail with an authentication or connectivity error.

Per-Volume Selective Encryption

Xloud-Developed — This capability is developed by Xloud and ships with XAVS / XPCI.
Xloud supports selective encryption — encrypted and unencrypted volume types coexist within the same deployment. This allows administrators to apply encryption only where compliance or data sensitivity requires it, avoiding the performance overhead of blanket encryption on non-sensitive workloads. Key characteristics:
  • Per-tenant key isolation — each tenant’s encryption keys are stored and managed independently in the Xloud Key Management service. Tenants cannot access each other’s keys, even if they share the same storage backend.
  • Three independent encryption layers — Xloud provides encryption at three distinct levels that can be enabled independently or together:
LayerScopeEncryption Point
Storage device encryptionFull disk on physical storage nodesHardware or dm-crypt on the OSD device
Block volume encryptionIndividual persistent volumesLUKS at the hypervisor (dm-crypt) per volume type
Compute ephemeral disk encryptionInstance root and ephemeral disksLUKS at the hypervisor for ephemeral storage
For most deployments, block volume encryption alone satisfies data-at-rest compliance requirements. Add storage device encryption for defense-in-depth on shared infrastructure, and ephemeral disk encryption for instances that process sensitive data without persistent volumes.

Next Steps

Key Manager User Guide

Manage encryption keys and secrets in the Xloud Key Management service

Volume Types & QoS

Create and manage volume types with backend associations

Security Hardening

Additional security policies for Block Storage

Admin Guide

Return to the Block Storage administration overview