To use the transparent data encryption (TDE) feature of Lindorm, you must assign the AliyunServiceRoleForTSDBLindormEncryption service-linked role to Lindorm. After the role is assigned to Lindorm, Lindorm can use the data encryption feature in the current Alibaba Cloud account.
Background information
AliyunServiceRoleForTSDBLindormEncryption
Role name: AliyunServiceRoleForTSDBLindormEncryption
Role policy: AliyunServiceRoleForTSDBLindormEncryption
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"kms:ListKeys",
"kms:ListResourceTags",
"kms:DescribeKey"
],
"Resource": [
"acs:kms:*:*:*"
]
},
{
"Effect": "Allow",
"Action": [
"kms:Encrypt",
"kms:Decrypt",
"kms:GenerateDataKey",
"kms:CreateAlias"
],
"Resource": [
"acs:kms:*:*:*"
],
"Condition": {
"StringEqualsIgnoreCase": {
"kms:tag/acs:lindorm:instance-encryption": "true"
}
}
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "encryption.hitsdb.aliyuncs.com"
}
}
}
]
}
Delete the AliyunServiceRoleForGwsDiskEncryption role
If you want to delete the AliyunServiceRoleForTSDBLindormEncryption service-linked role, make sure that no instances in your account use the service-linked role. For more information, see Delete a service-linked role.
Permissions that are required by a RAM user to create a service-linked role
In most cases, the permissions that are required to create a service-linked role are included in the administrator policy of the corresponding cloud service. You can create a service-linked role for the cloud service if you are granted the administrator permissions on the cloud service.
{
"Action": "ram:CreateServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "encryption.hitsdb.aliyuncs.com"
}
}
}