adamreeve commented on PR #7387:
URL: https://github.com/apache/arrow-rs/pull/7387#issuecomment-2789608132

   > I mean even better would be for them to be using the envelope encryption 
facilities the cloud/hosting providers themselves provide... My understanding 
of this PR is the user's still have to manage and store the KEKs themselves, 
handle rotation, etc... Is there an argument that whilst perhaps better than 
the low-level interface it still requires quite a sophisticated user to use it 
securely?
   
   I don't think this understanding is quite right. Users would be expected to 
use the encryption facilities provided by their cloud environment or 
organisation's security team. This module just provides a way to integrate with 
those facilities while being compatible with other Parquet implementations.
   
   The management and rotation of master keys is the responsibility of the KMS, 
and ideally the user would only need to implement a very thin wrapper over the 
KMS API to integrate with this crate.
   
   > IMO parquet-rs should provide the minimal hooks to allow people to 
securely support modular encryption in their environment with the primitives 
available to them, be they a cloud-based KMS or HSM solution or something else
   
   That is what this module does. I think it's not actually doing as much as 
you think it is? It really just provides a way to generate random data 
encryption keys that can then be encrypted in whatever way makes sense in the 
user's environment, and implements a standardised JSON metadata format for the 
key material to allow later decrypting those keys and providing compatibility 
with other Parquet implementations.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to