From e4fa1884ee2a7803ba3c3fdcfb57c30fde933277 Mon Sep 17 00:00:00 2001 From: Fi Quick <47183728+fiquick@users.noreply.github.com> Date: Mon, 11 Mar 2024 10:46:04 +0000 Subject: [PATCH] adding CMEK info --- modules/ROOT/pages/platform/security.adoc | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/modules/ROOT/pages/platform/security.adoc b/modules/ROOT/pages/platform/security.adoc index e62dea0f1..d0207a809 100644 --- a/modules/ROOT/pages/platform/security.adoc +++ b/modules/ROOT/pages/platform/security.adoc @@ -262,15 +262,16 @@ label:AuraDB-Enterprise[] Use keys from the AWS Key Management Service (KMS) to encrypt a database. -[CAUTION] +[WARNING] ==== Deleting a key makes all data encrypted under that key unrecoverable. Neo4j cannot administer instances when keys are disabled, deleted or permissions revoked. ==== -* Create a single-region key in the AWS KMS console ensuring the region matches your Neo4j instance. -* Within the Neo4j Aura Console, navigate to the security settings and create a customer managed key. -* Edit the AWS key policy. Refer to the example key policy structure for guidance on formatting. +* Create a single-region key in the AWS console ensuring the region matches your Neo4j instance. +* Go to security settings in the Aura Console, create a customer managed key and copy the generated JSON code. +* Within the AWS console, edit the key policy to include the JSON code. +Refer to the example key policy structure for guidance on formatting. ==== Key policy structure