Overview
As part of cloud assets protection, Druva backs up customer data on Druva AWS instances, separating from source data. Historically, this data is encrypted using the Druva Key Management Service.
If your organizational policies require complete control over the encryption of the data backed up by Druva, Enterprise Key Management is the solution for you. With Enterprise Key Management, you can use keys from your AWS Key Management Service (KMS) account to encrypt and decrypt your data. It adds an extra layer of security to Druva's default encryption.
Enterprise Key Management is available upon request. This feature is also called Bring Your Own Key (BYOK).
❗ Important
Enterprise Key Management is under controlled availability. To enable this feature for your account, contact Druva Support.
Supported Keys
Customers can host their keys in their own AWS Key Vault. This feature also supports all AWS-integrated third-party enterprise keys.
Customer keys hosted in non-AWS environments, including Microsoft Azure or Google Cloud, are not supported.
Benefits
Enterprise Key Management provides the following security benefits:
Use the keys from your KMS account to encrypt and decrypt your data.
Easily manage your encryption keys within your AWS account: generate, revoke, rotate, and destroy them as needed.
Control access to data backed up by Druva.
Secure backed-up data.
Considerations
Before enabling Enterprise Key Management for your account, take note of these critical considerations:
No turning back: Once you switch to Enterprise Key Management, you can't return to the default Cloud Key Management.
❗Important
When Switching Customer-Managed AWS KMS Keys
During a transition to a new customer-managed AWS KMS key, do not deactivate the old customer-managed AWS KMS key until the new key has been fully integrated within the Druva Console. This ensures uninterrupted data access throughout the process.
Superior encryption: Enterprise Key Management takes precedence over Cloud Key Management. Enabling Enterprise Key Management will automatically disable Cloud Key Management for your account.
Prerequisites
Before you start using Enterprise Key Management, make sure you have the following:
An AWS account with access to the Key Management Service (KMS) for managing customer master keys.
The Druva support team has activated your account's Enterprise Key Management configuration.
Without this activation, you won't see the configuration fields on the Druva Console.
Supported Workflows
These workflows can use your key to encrypt or decrypt your data when Druva runs them:
Backups: Scheduled and manual backups.
Restores: In-place restores of your Entra ID entities to your account.
Downloads: Download the data to a device such as a laptop or a desktop.
❗ Important
If you revoke an encryption key's access, then the subsequent backups, restores, or downloads will fail.
Enable Enterprise Key Management
Follow these steps to enable Enterprise Key Management for your organization:
Step 1: Copy Druva's AWS account ID from the Druva Console
Open the Druva console and navigate to Settings.
Click Endpoints & SaaS Apps Settings.
Copy your 12-digit Druva AWS account ID from the Enterprise Key Management section.
Save this numeric value for the AWS KMS console.
Step 2: Get the key ARN from your AWS KMS account:
Login to AWS KMS Console.
Click Services in the menu, then search for KMS. The KMS page opens.
Click Customer managed keys from the left pane. A list of managed keys is displayed.
On the Key type page, click the Create key > Symmetric key.
On the Add labels page, provide the key Alias used to identify the key and description, and click Next.
Select one or more administrators who can control the key on the Key Administrators' page. The key administrator selected here can rotate and revoke the key you are about to generate.
Select Allow key administrators to delete this key to enable the delete right for the administrators.
On the next page, click Add another AWS account. A text box is displayed. This setting defines the account with which the AWS KMS must communicate to authenticate access to the backed-up data.
Enter the 12-digit Druva AWS account ID copied from the Enterprise Key Management tab of the Druva Console.
Click Next to review the key policy. The page displays the permissions available for the Druva account when it accesses the key during backups and restores.
On the Review and edit key policy screen, type Allow under Allow use of the Key for Druva inSync.
Click Finish. The new key is generated and displayed on the AWS KMS console.
Click the key Alias on the console to view the key details. The General configuration details are displayed as below:
Copy the value displayed under ARN from the AWS KMS console. This key is required to enable the Enterprise Key Management on the Druva Console.
Step 3. Enable Enterprise Key Management from the Druva console
From the settings page, go to Enterprise Key Management.
Go to and select Enable Enterprise KeyManagement.The Enterprise key window appears.
Copy the newly created AWS KMS key ARN into the Update KMS key ARN dialog box and click Next. The ARN is validated, and a confirmation message appears upon successful authentication.
Click Save.
Click Continue to review the legal terms and conditions for enabling Enterprise Key Management.
Click Yes, I Agree. Enterprise Key Management gets enabled for your account.
KMS key ARN is displayed on the Key Management tab, with External Cloud Key Management status as Enabled.
Update the Enterprise Encryption key
You may have to update the Enterprise Encryption key to comply with your organizational security policies. However, it is essential to note that you must keep the old and new encryption keys active in your AWS KMS service until you configure the new KMS key ARN on the Druva Console. This ensures all the required permissions are transferred from the old key to the new encryption key before the AWS KMS purges the old key.
To update the Enterprise Encryption key:
Get the new KMS key ARN using the steps provided above.
From the settings page, go to the Enterprise Key Management settings.
Click Update KMS Key ARN.
Copy the newly created KMS key ARN into the Update KMS key ARN dialog box and click Save. The KMS Key ARN, upon successful validation, is updated.