Skip to main content
Version: 8.7

Encryption

Camunda 8 SaaS encrypts all cluster data at rest. By default, encryption uses cloud provider–managed keys. For stricter compliance or control, you can configure Bring Your Own Key (BYOK) with AWS KMS, available for clusters hosted in AWS Regions.

Encryption overview

With BYOK, Camunda 8 SaaS uses your customer-managed key stored in your AWS account.
You control the key’s lifecycle—creation, access, rotation, and logging—while Camunda handles encryption and decryption operations.

CategoryDetails
AvailabilityAWS-hosted clusters only
Encrypted storageDocument, backup, Zeebe, and Elasticsearch disks
SetupConfigure the key during cluster creation
RotationManaged in AWS KMS (not through Camunda)
LoggingKey usage visible in AWS CloudTrail
Encryption details for beginners

Encryption at rest protects stored data from unauthorized access.
Camunda 8 SaaS supports three encryption models:

TypeManaged byDescription
Camunda-managedCamundaDefault encryption, handled automatically
AWS managedAWSEncryption in your account, but AWS controls key lifecycle
Customer-managed (BYOK)YouYou create, own, and manage the key in your AWS account

Industries such as finance, healthcare, and government often require this level of control for compliance reasons.
With BYOK, you maintain visibility through AWS CloudTrail and Amazon CloudWatch, apply your own rotation policies, and centralize audit logs in your AWS account.

Responsibilities

OwnerResponsibility
CustomerCreate and manage the AWS KMS key
CustomerEnsure the key and cluster are in the same AWS Region
CustomerConfigure key policies granting Camunda access
CamundaEncrypt and decrypt customer data using the provided key
CamundaSurface any key-related errors in the Console
Key management

If your AWS KMS key is disabled, deleted, or permissions are revoked, your cluster and its data become inaccessible.

Cost implications

Using external encryption keys with AWS KMS incurs costs directly in your AWS account. Camunda does not charge for the feature itself, but you are responsible for AWS KMS key storage, management, and persistence of logs.

Cost typeDescriptionNotes
KMS key storageMonthly charge for each AWS KMS keyDepends on AWS Region and key type
CloudTrail logsCharges for storing and accessing AWS CloudTrail eventsIncludes encryption/decryption activity by Camunda cluster
note

Customers are not charged for key usage operations (for example, encrypting or decrypting) as per AWS KMS pricing.

Cost responsibility

You are responsible for monitoring AWS KMS key storage, management, and log persistence costs.

Cost optimization tips

  • Use separate keys only when necessary to avoid extra storage fees.
  • Review AWS CloudTrail retention settings to balance compliance and storage cost.