The always-confidential database feature encrypts the sensitive data columns in your ApsaraDB RDS for PostgreSQL instance. This prevents unauthorized users from accessing the plaintext of the protected data columns by using software and tools in the cloud platform. This also ensures that the sensitive data columns are available but invisible to database users. By default, the always-confidential database feature is integrated with ApsaraDB RDS for PostgreSQL. However, you must complete the required configurations before you use the feature. This topic describes how to enable the always-confidential database feature for your RDS instance.
Supported instance types
The always-confidential database feature is supported for all standard RDS instances regardless of the instance types. The feature provides two editions to meet the requirements of Intel SGX-based security-enhanced instance types.
Edition | Instance family |
Basic edition of the always-confidential database feature | Instance types other than the Intel SGX-based security-enhanced instance types |
Hardware-enhanced edition of the always-confidential database feature (Intel SGX-based) | Intel SGX-based security-enhanced instance types |
The security levels of the always-confidential database feature vary based on the edition of the feature. For more information, see Security levels provided by the always-confidential database feature.
To use the basic edition of the always-confidential database feature, make sure that the minor engine version of the RDS instance is 20230830 or later.
Serverless RDS instances are not supported.
YiTian RDS instances are not supported.
For more information about the supported instance types, see Primary ApsaraDB RDS for PostgreSQL instance types. The following section lists the instance types that are supported for the hardware-enhanced edition of the always-confidential database feature (Intel SGX-based).
Prerequisites
An RDS instance is created based on security levels. For more information, see Create an ApsaraDB RDS for PostgreSQL instance.
A privileged account is created. For more information, see Create an account.
Procedure
Create a database for which you want to enable the always-confidential database feature. For more information, see Create a database.
After the database is connected by using the privileged account, execute the following SQL statement to install the extension that provides the always-confidential database feature and enable the feature:
NoteFor more information about how to connect to an RDS instance, see Connect to an ApsaraDB RDS for PostgreSQL instance.
-- Install the EncDB extension. CREATE EXTENSION encdb;
What to do next
Before you use the always-confidential database feature, you must define sensitive data based on your business requirements. For more information, see Define sensitive data.