Hi Mathew,
Thank you very much for the quick reply! This is very helpful.
My use-case has specific requirements on the type of encryption to be used. For the KV engine, from the docs, I see that this is the type of encryption that is being used and from what you've said this is not configurable.
"The storage backends used by Vault are also untrusted by design. Vault uses a security barrier for all requests made to the backend. The security barrier automatically encrypts all data leaving Vault using a 256-bit Advanced Encryption Standard (AES) cipher in the Galois Counter Mode (GCM) with 96-bit nonces. The nonce is randomly generated for every encrypted object. When data is read from the security barrier the GCM authentication tag is verified during the decryption process to detect any tampering."
Is this underlying choice made by the Vault designers - "AES-256+GCM", something that is bound to change? Could you please help point me to the code where this encryption is being done so I can look in to this?
I see, this seems workable. I would really like to use Vault both for encryption and storage. However, with this proposed method, the number of operations to Vault are now doubled. One to encrypt and another to store (and similar when being retrieved). Also the data is going to be doubly encrypted - which seems unnecessary.
Thank you again for responding to my query.
Best!