Skip to main content

Customer-managed keys for Lakebase

info

Lakebase Autoscaling is the latest version of Lakebase, with autoscaling compute, scale-to-zero, branching, and instant restore. For supported regions, see Region availability. If you are a Lakebase Provisioned user, see Lakebase Provisioned.

Customer-managed keys (CMK) let you encrypt Lakebase Autoscaling project data at rest (stored data) using a key that your organization owns and manages in your cloud key management service (KMS). This gives your organization full sovereignty over its encryption and helps meet regulatory and compliance requirements: revoking the key revokes all access to data.

Requirements

This section applies to workspace admins who want to enable CMK for Lakebase.

  • The workspace must be on the Enterprise tier.
  • CMK applies only to new Lakebase Autoscaling projects created after Lakebase CMK support became available in your region. Projects created before that do not support CMK. Check Customer-managed keys in your project settings to see the status for any project.
  • CMK is available for Lakebase Autoscaling only. Lakebase Provisioned instances do not support CMK.

Enable CMK for Lakebase

Workspace admins enable CMK for Lakebase at the workspace level, not per project. Once enabled, every new Lakebase project on that workspace is automatically encrypted with your key. Existing projects are not affected.

Lakebase uses the Managed services use case. Select this when creating your encryption key configuration in the Account Console.

Resource

Description

Configure customer-managed keys for encryption

Full setup walkthrough: AWS KMS key creation, key policy, cross-account IAM role permissions, and workspace attachment.

Check encryption status

As a Lakebase user, you don't configure CMK directly. To check if your project is currently encrypted by a CMK:

  1. Click the App icon. apps switcher in the top right corner of your workspace to open the Lakebase App.
  2. Select your project.
  3. Click Settings in the left sidebar.
  4. Under Customer-managed keys, check the status card.

Customer-managed keys status card showing Active status

The status card shows one of the following:

Status

What it means

Active

Your project is encrypted with a customer-managed key. No action needed.

Not configured

No customer-managed key is configured on this workspace. If your organization requires CMK, contact your workspace admin.

Not supported

This project was created before customer-managed keys were available in this region and is not encrypted with a CMK.

Key unreachable

The customer-managed workspace encryption key is no longer accessible. Your project is unavailable. Contact your workspace admin to restore KMS access. See Key revocation.

Key rotation

When your workspace admin rotates the key in your cloud KMS, Lakebase projects are not affected. Projects remain accessible with no downtime or action required.

Key revocation

If the customer-managed key is revoked, deleted, or its permissions are changed so that Databricks can no longer access it:

  • All Lakebase projects on the workspace become unavailable.
  • Running compute instances for CMK-supported projects are stopped.
  • New projects cannot be created.
  • A banner appears in the Lakebase console: Database projects unavailable due to key access issue.

To restore access, a workspace admin must re-enable the key or restore its permissions in your cloud KMS. After the key is accessible again, allow some time for the change to propagate before restarting your compute instances and accessing your projects.

important

Key revocation affects all Databricks resources on the workspace that use the managed services key, not just Lakebase projects. For more information about customer-managed keys, see Customer-managed keys for encryption.