MariaDB supports data-at-rest encryption for tables using the InnoDB and XtraDB storage engines. When enabled, the server encrypts data when it writes it to and decrypts data when it reads it from the file system.
For encrypting data with the Aria storage engine, see Encrypting Data for Aria.
Using data-at-rest encryption requires that you first configure an Encryption Key Management plugin, such as the file_key_management
or aws_key_management
plugins. MariaDB uses this plugin to store, retrieve and manage the various keys it uses when encrypting data to and decrypting data from the file system.
Once you have the plugin configured, you need to set a few additional system variables to enable encryption on InnoDB and XtraDB tables, including innodb_encrypt_tables
, innodb_encrypt_logs
, innodb_encryption_threads
, and innodb_encryption_rotate_key_age
.
[mariadb] ... # File Key Management plugin_load_add = file_key_management file_key_management_filename = /etc/mysql/encryption/keyfile.enc file_key_management_filekey = FILE:/etc/mysql/encryption/keyfile.key file_key_management_encryption_algorithm = AES_CTR # InnoDB/XtraDB Encryption innodb_encrypt_tables = ON innodb_encrypt_temporary_tables = ON innodb_encrypt_log = ON innodb_encryption_threads = 4 innodb_encryption_rotate_key_age = 1
For more information on system variables for encryption and other features, see the InnoDB system variables page.
When using data-at-rest encryption with the InnoDB or XtraDB storage engines, it is not necessary that you encrypt every table in your database. You can check which tables are encrypted and which are not by querying the INNODB_TABLESPACES_ENCRYPTION
table in the Information Schema. This table provides information on which tablespaces are encrypted, which encryption key each tablespace is encrypted with, and whether the background encryption threads are currently working on the tablespace. Since the system tablespace can also contain tables, it can be helpful to join the INNODB_TABLESPACES_ENCRYPTION
table with the INNODB_SYS_TABLES
table to find out the encryption status of each specific table, rather than each tablespace. For example:
SELECT st.SPACE, st.NAME, te.ENCRYPTION_SCHEME, te.ROTATING_OR_FLUSHING FROM information_schema.INNODB_TABLESPACES_ENCRYPTION te JOIN information_schema.INNODB_SYS_TABLES st ON te.SPACE = st.SPACE \G *************************** 1. row *************************** SPACE: 0 NAME: SYS_DATAFILES ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 2. row *************************** SPACE: 0 NAME: SYS_FOREIGN ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 3. row *************************** SPACE: 0 NAME: SYS_FOREIGN_COLS ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 4. row *************************** SPACE: 0 NAME: SYS_TABLESPACES ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 5. row *************************** SPACE: 0 NAME: SYS_VIRTUAL ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 6. row *************************** SPACE: 0 NAME: db1/default_encrypted_tab1 ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 7. row *************************** SPACE: 416 NAME: db1/default_encrypted_tab2 ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 8. row *************************** SPACE: 402 NAME: db1/tab ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 9. row *************************** SPACE: 185 NAME: db1/tab1 ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 10. row *************************** SPACE: 184 NAME: db1/tab2 ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 11. row *************************** SPACE: 414 NAME: db1/testgb2 ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 12. row *************************** SPACE: 4 NAME: mysql/gtid_slave_pos ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 13. row *************************** SPACE: 2 NAME: mysql/innodb_index_stats ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 14. row *************************** SPACE: 1 NAME: mysql/innodb_table_stats ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 *************************** 15. row *************************** SPACE: 3 NAME: mysql/transaction_registry ENCRYPTION_SCHEME: 1 ROTATING_OR_FLUSHING: 0 15 rows in set (0.000 sec)
Using data-at-rest encryption with InnoDB, the innodb_encrypt_tables
system variable only encrypts the InnoDB tablespaces. In order to also encrypt the InnoDB Redo Logs, you also need to set the innodb_encrypt_logs
system variable.
Beginning in MariaDB 10.4, where the encryption key management plugin supports key rotation the InnoDB Redo Log can also rotate encryption keys. In previous releases, the Redo Log can only use the first encryption key.
© 2019 MariaDB
Licensed under the Creative Commons Attribution 3.0 Unported License and the GNU Free Documentation License.
https://mariadb.com/kb/en/innodb-encryption-overview/