The Art of Encryption: Secure Your Data at Rest

In the ever-evolving landscape of digital security, data encryption and secrets management have become pivotal practices for safeguarding sensitive information. To explore these practices, I recently sat down with Alex Mitchell, a seasoned cyber security analyst who has seen the industry evolve over the past decade. Our conversation delved into the nuances of encrypting data at rest and the importance of rotating customer master keys (CMKs). Here’s how it unfolded.

Protect your data without breaking the bankTrueNAS combines award-winning quality with cost efficiency.


Chuck Derricks: Alex, thanks for joining me today. Let’s start with the basics. Why is encrypting data at rest considered a best practice?

Alex Mitchell: Thanks for having me, Chuck. Encrypting data at rest is essential because it acts as a safeguard against unauthorised access. Data at rest refers to data that is stored on a physical or digital medium, and it’s crucial to protect it from potential breaches. Encryption ensures that even if someone gains access to the physical storage, they can’t read the data without the decryption key. It’s like having a safe for your digital assets.

CD: That makes sense. What would you say to someone who is unsure whether their data needs encryption?

AM: I always say, if you’re unsure, just encrypt it. The risk of leaving data unprotected is far greater than the effort required to encrypt it. Even if you think the data isn’t sensitive today, it might become so in the future. Encrypting from the start is a proactive approach to security.

CD: You mentioned rotating CMKs periodically. Why is this important?

AM: Rotating your CMKs, or customer master keys, is vital because it limits the amount of data encrypted with a single key. If a key is compromised, only the data encrypted with that specific key is at risk. By rotating keys, you mitigate potential damage. It’s akin to changing your passwords regularly. With AWS, for instance, you can configure KMS to rotate your keys automatically, which is a robust way to maintain security without manual intervention.

CD: What advice would you give to someone managing large datasets, particularly with cloud services like AWS?

AM: Using cloud services like AWS offers great flexibility, but it also requires careful management. With services like EBS, EFS, and FSx for Lustre, you have built-in options for encryption at rest. It’s crucial to understand the configurations available, like the choice between a service-managed key and a customer master key. You should also ensure your data in transit is protected. For instance, EFS allows you to add transport encryption easily. Always keep an eye on security updates from your provider and adapt accordingly.

CD: How can secrets management complement data encryption?

AM: Secrets management is about protecting sensitive information like passwords and API keys. In Kubernetes, for instance, secrets are stored as base64 encoded strings, which isn’t secure enough on its own. Using AWS KMS for envelope encryption of these secrets adds a layer of security, ensuring they remain protected even when stored. Additionally, audit logging and monitoring can alert you to any unauthorised access attempts, providing an extra layer of defence.

CD: What are some best practices for managing secrets within Kubernetes?

AM: One key practice is to use volume mounts instead of environment variables. Environment variables are prone to exposure in logs, while volume mounts are more secure. It’s also wise to use an external secrets provider like AWS Secrets Manager or Vault, which offer features like automatic rotation and fine-grained access controls. This way, you can manage secrets more effectively and reduce the risk of exposure.

CD: It seems like there’s a lot to manage. How do you keep everything organised?

AM: Organisation is critical. Use namespaces to isolate secrets for different applications, reducing the risk of cross-application access. Regular audits and reviews of your secrets management policies are also crucial. These practices, combined with automated tools, can significantly streamline the process and enhance security.

CD: Finally, any thoughts on the future of data encryption and secrets management?

AM: The landscape is constantly changing, with new threats and technologies emerging. Staying informed and adaptable is key. Encryption and secrets management will continue to evolve, and we must evolve with them. Embracing automation and leveraging cloud-native tools will be essential for maintaining robust security frameworks.

CD: Thanks, Alex, for sharing your insights. It’s been an enlightening conversation.

AM: My pleasure, Chuck. Always happy to discuss ways to keep data safe.


In an era where data breaches are increasingly common, encrypting data at rest and managing secrets effectively are not just best practices—they are necessities. Alex’s insights underscore the importance of proactive security measures. By following these principles, organisations can better protect their data and navigate the complexities of modern cyber security.

Chuck Derricks