Skip to main content
Version: 8.7

Encryption

Camunda 8 SaaS encrypts all cluster data at rest. By default, encryption uses cloud provider–managed keys. For stricter compliance or control, you can configure Bring Your Own Key (BYOK) with Amazon KMS, available for clusters hosted in AWS regions.

Encryption overview

With BYOK, Camunda 8 SaaS uses your customer-managed key stored in your AWS account.
You control the key’s lifecycle—creation, access, rotation, and logging—while Camunda handles encryption and decryption operations.

CategoryDetails
AvailabilityAWS-hosted clusters only
Encrypted storageDocument, backup, Zeebe, and Elasticsearch disks
SetupConfigure the key during cluster creation
RotationManaged in AWS KMS (not through Camunda)
LoggingKey usage visible in AWS CloudTrail
Encryption details for beginners

Encryption at rest protects stored data from unauthorized access.
Camunda 8 SaaS supports three encryption models:

TypeManaged byDescription
Camunda-managedCamundaDefault encryption, handled automatically
Amazon-managedAWSEncryption in your account, but AWS controls key lifecycle
Customer-managed (BYOK)YouYou create, own, and manage the key in your AWS account

Industries such as finance, healthcare, and government often require this level of control for compliance reasons.
With BYOK, you maintain visibility through CloudTrail and CloudWatch, apply your own rotation policies, and centralize audit logs in your AWS account.

Responsibilities

OwnerResponsibility
CustomerCreate and manage the KMS key in AWS
CustomerEnsure the key and cluster are in the same AWS region
CustomerConfigure key policies granting Camunda access
CamundaEncrypt and decrypt customer data using the provided key
CamundaSurface any key-related errors in the Console
Key management

If your KMS key is disabled, deleted, or permissions are revoked, your cluster and its data become inaccessible.

Cost implications

Using external encryption keys with Amazon KMS incurs costs directly in your Amazon account. Camunda does not charge for the feature itself, but you are responsible for all Amazon KMS usage.

Cost typeDescriptionNotes
KMS key storageMonthly charge for each KMS keyDepends on Amazon region and key type
API requestsCharges for KMS API calls (Encrypt, Decrypt, GenerateDataKey, ReEncrypt)Costs increase with frequent operations
CloudTrail logsCharges for storing and accessing CloudTrail eventsIncludes encryption/decryption activity by Camunda cluster
Cost responsibility

You are responsible for monitoring Amazon KMS usage and associated costs.

Cost optimization tips

  • Use separate keys only when necessary to avoid extra storage fees.
  • Aggregate audit logging to reduce frequent API calls.
  • Review CloudTrail retention settings to balance compliance and storage cost.