Interface CfnRepositoryCreationTemplate.EncryptionConfigurationProperty
- All Superinterfaces:
software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
CfnRepositoryCreationTemplate.EncryptionConfigurationProperty.Jsii$Proxy
- Enclosing class:
CfnRepositoryCreationTemplate
By default, when no encryption configuration is set or the AES256
encryption type is used, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts your data at rest using an AES256 encryption algorithm. This does not require any action on your part.
For more control over the encryption of the contents of your repository, you can use server-side encryption with AWS Key Management Service key stored in AWS Key Management Service ( AWS KMS ) to encrypt your images. For more information, see Amazon ECR encryption at rest in the Amazon Elastic Container Registry User Guide .
Example:
// The code below shows an example of how to instantiate this type. // The values are placeholders you should change. import software.amazon.awscdk.services.ecr.*; EncryptionConfigurationProperty encryptionConfigurationProperty = EncryptionConfigurationProperty.builder() .encryptionType("encryptionType") // the properties below are optional .kmsKey("kmsKey") .build();
- See Also:
-
Nested Class Summary
Modifier and TypeInterfaceDescriptionstatic final class
static final class
An implementation forCfnRepositoryCreationTemplate.EncryptionConfigurationProperty
-
Method Summary
Methods inherited from interface software.amazon.jsii.JsiiSerializable
$jsii$toJson
-
Method Details
-
getEncryptionType
The encryption type to use.If you use the
KMS
encryption type, the contents of the repository will be encrypted using server-side encryption with AWS Key Management Service key stored in AWS KMS . When you use AWS KMS to encrypt your data, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you already created.If you use the
KMS_DSSE
encryption type, the contents of the repository will be encrypted with two layers of encryption using server-side encryption with the AWS KMS Management Service key stored in AWS KMS . Similar to theKMS
encryption type, you can either use the default AWS managed AWS KMS key for Amazon ECR, or specify your own AWS KMS key, which you've already created.If you use the
AES256
encryption type, Amazon ECR uses server-side encryption with Amazon S3-managed encryption keys which encrypts the images in the repository using an AES256 encryption algorithm.For more information, see Amazon ECR encryption at rest in the Amazon Elastic Container Registry User Guide .
- See Also:
-
getKmsKey
If you use theKMS
encryption type, specify the AWS KMS key to use for encryption.The alias, key ID, or full ARN of the AWS KMS key can be specified. The key must exist in the same Region as the repository. If no key is specified, the default AWS managed AWS KMS key for Amazon ECR will be used.
- See Also:
-
builder
@Stability(Stable) static CfnRepositoryCreationTemplate.EncryptionConfigurationProperty.Builder builder()
-