@@ -221,27 +221,41 @@ Cube Store cluster uses both persistent and scratch storage.
221221Cube Store makes use of a separate storage layer for storing metadata as well as
222222for persisting pre-aggregations as Parquet files.
223223
224- Cube Store [ can be configured][ref-config-env] to use either AWS S3 or
225- Google Cloud Storage (GCS) as persistent storage. If desired, local path on
224+ Cube Store can be configured to use either AWS S3, Google Cloud Storage (GCS), or
225+ Azure Blob Storage as persistent storage. If desired, a local path on
226226the server can also be used in case all Cube Store cluster nodes are
227227co-located on a single machine.
228228
229229<InfoBox>
230230
231- Cube Store can only use one type of remote storage at runtime .
231+ Cube Store can only use one type of remote storage at the same time .
232232
233233</InfoBox>
234234
235235<WarningBox>
236236
237- Cube Store requires strong consistency guarantees from underlying distributed
238- storage. AWS S3, Google Cloud Storage, and Azure Blob Storage (Cube Cloud only)
239- are the only known implementations that provide strong consistency. Using other
240- implementations in production is discouraged and can lead to consistency and
241- data corruption errors.
237+ Cube Store requires strong consistency guarantees from an underlying distributed
238+ storage. AWS S3, Google Cloud Storage, and Azure Blob Storage are the only known
239+ implementations that provide them. Using other implementations in production is
240+ discouraged and can lead to consistency and data corruption errors.
242241
243242</WarningBox>
244243
244+ <SuccessBox>
245+
246+ Using Azure Blob Storage with Cube Store is only supported in Cube Cloud on
247+ [Enterprise and above plans](https://cube.dev/pricing).
248+
249+ </SuccessBox>
250+
251+ <InfoBox>
252+
253+ As an additional layer on top of standard AWS S3, Google Cloud Storage (GCS), or
254+ Azure Blob Storage encryption, persistent storage can optionally use [Parquet
255+ encryption](#data-at-rest-encryption) for data-at-rest protection.
256+
257+ </InfoBox>
258+
245259A simplified example using AWS S3 might look like :
246260
247261` ` ` yaml
@@ -313,10 +327,37 @@ should be built before any tables are removed.
313327
314328# # Security
315329
316- Cube Store currently does not have any in-built authentication mechanisms. For
317- this reason, we recommend running your Cube Store cluster on a network that only
318- allows requests from the Cube deployment.
330+ # ## Authentication
331+
332+ Cube Store does not have any in-built authentication mechanisms. For this reason,
333+ we recommend running your Cube Store cluster with a network configuration that
334+ only allows access from the Cube deployment.
335+
336+ # ## Data-at-rest encryption
337+
338+ [Persistent storage](#persistent-storage) is secured using the standard AWS S3,
339+ Google Cloud Storage (GCS), or Azure Blob Storage encryption.
340+
341+ Cube Store also provides optional data-at-rest protection by utilizing the
342+ [modular encryption mechanism][link-parquet-encryption] of Parquet files in its
343+ persistent storage. Pre-aggregation data is secured using the [AES cipher][link-aes]
344+ with 256-bit keys. Data encyption and decryption are completely seamless to Cube
345+ Store operations.
346+
347+ <SuccessBox>
348+
349+ Data-at-rest encryption in Cube Store is only available in Cube Cloud on
350+ [Enterprise and above plans](https://cube.dev/pricing).
351+
352+ </SuccessBox>
353+
354+ You can provide, rotate, or drop your own [customer-managed keys][ref-cmk] (CMK)
355+ for Cube Store via the <Btn>Encryption Keys</Btn> page in Cube Cloud.
356+
319357
320358[link-wsl2] : https://docs.microsoft.com/en-us/windows/wsl/install-win10
321359[ref-caching-partitioning] : /product/caching/using-pre-aggregations#partitioning
322360[ref-config-env] : /reference/configuration/environment-variables
361+ [link-parquet-encryption] : https://parquet.apache.org/docs/file-format/data-pages/encryption/
362+ [link-aes] : https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
363+ [ref-cmk] : /product/workspace/encryption-keys
0 commit comments