Cloud KMS for the PCA Exam: CMEK vs CSEK vs Default Encryption

GCP Study Hub
Ben Makansi
January 8, 2026

Encryption questions on the Professional Cloud Architect exam tend to look simple at first glance. The wording usually centers on a regulated workload, a compliance requirement, and a choice between letting Google handle the keys, managing the keys yourself in Google Cloud, or supplying keys that Google never sees. The trick is that those three options sound similar, but they map to very different operational and compliance postures. I want to walk through how I think about Cloud KMS, CMEK, and CSEK so the right answer becomes obvious when an exam scenario lands in front of you.

What Cloud KMS Actually Does

Cloud KMS stands for Key Management Service. It is the Google Cloud service that lets you create, use, rotate, and destroy cryptographic keys. Those four verbs are the entire lifecycle of a key, and Cloud KMS exists so you can manage that lifecycle yourself rather than handing it over to Google.

The reason this matters is regulatory. Industries like healthcare under HIPAA, finance, government, and any organization subject to GDPR are often required to demonstrate control over how keys are created, rotated, and revoked. Default Google-managed encryption is fine for most workloads, but it does not give you that control, and on the Professional Cloud Architect exam the moment you see compliance language tied to encryption key control, Cloud KMS is in play.

Default Encryption: What You Get for Free

Every byte of data at rest in Google Cloud is already encrypted. You do not have to enable anything, configure anything, or create a key. Google generates the keys, rotates them, and destroys them on its own schedule. From a security standpoint this is genuinely strong protection, and for the vast majority of workloads it is sufficient.

The limitation is purely about who controls the key. With default encryption, you do not. You cannot rotate the key on demand, you cannot revoke it to render data unreadable, and you cannot point to an audit trail showing your organization made specific decisions about key management. If a compliance framework requires those capabilities, default encryption is not enough.

Customer-Managed Encryption Keys (CMEK)

CMEK is the middle option, and it is the one most regulated workloads land on. The keys live inside Cloud KMS, which means Google still operates the underlying infrastructure, but you own the lifecycle. You decide when a key is created, you control how it is used, you set the rotation schedule, and you revoke or destroy the key when its job is done.

CMEK is supported broadly across Google Cloud. The services I see come up most often on Professional Cloud Architect exam scenarios are Cloud Storage, Compute Engine persistent disks, and BigQuery datasets. When a question describes a regulated workload that needs encryption key control while still using managed Google Cloud services, CMEK is almost always the answer.

The lifecycle of a CMEK key follows the same four stages I mentioned earlier. Creation generates the key inside Cloud KMS. Usage is the period during which the key encrypts and decrypts data on your behalf. Rotation replaces the key with a new version on a schedule you define, which limits exposure if a key is ever compromised. Revocation retires the key so it can no longer be used, which is a powerful control because revoking a key effectively makes data encrypted with it unreadable.

Customer-Supplied Encryption Keys (CSEK)

CSEK is the strictest option, and it is the one that catches people out on the Professional Cloud Architect exam. With CSEK, the key is supplied and managed entirely by the customer. Google never stores the key. Google never manages the key. The key lives outside Google Cloud, and all encryption and decryption happens client-side before data ever reaches a Google Cloud service.

That last point is the one to internalize. CSEK is not just CMEK with extra paperwork. It is a fundamentally different model where the encryption boundary sits outside Google Cloud entirely. For Cloud Storage, CSEK keys are typically referenced through a .boto configuration file when uploading objects with gsutil, and the data is encrypted before the upload happens. For BigQuery, the data is encrypted with a customer-supplied key before being imported, and decryption has to be handled externally.

The trade-off is responsibility. Because Google never holds the key, Google cannot help you recover from losing it. If you lose access to a CSEK key, the data encrypted with it is permanently inaccessible. There is no support ticket that fixes this. That risk is the reason CSEK is reserved for organizations with mature key management infrastructure, often on-premises, and a regulatory or contractual reason to keep keys completely outside the cloud provider's environment.

How to Pick the Right Option on Exam Questions

The decision tree I use is short. If a question does not mention compliance, key control, or audit requirements, default encryption is fine. If a question mentions regulatory requirements like HIPAA, GDPR, or financial compliance, and asks for control over key creation, rotation, or revocation while still using Google Cloud services, the answer is CMEK. If a question specifies that the customer must own the key entirely, that Google must never have access to the key, or that encryption must happen outside Google Cloud, the answer is CSEK.

The wording on the Professional Cloud Architect exam tends to be precise about this. Phrases like "control over key rotation" point to CMEK. Phrases like "Google must never store the key" or "key managed entirely by the customer" point to CSEK. Default encryption rarely shows up as a correct answer in compliance scenarios, but it is sometimes the right choice when a question is really about cost or operational simplicity rather than key control.

Operational Realities Behind the Exam Wording

One thing the exam does not always make obvious is how different these options feel in practice. Default encryption is invisible. CMEK adds a key management layer that an architect or platform team has to operate, including rotation policies, IAM permissions on keys, and key version management. CSEK adds an entirely separate key management infrastructure outside Google Cloud, plus the operational discipline to never lose a key and to handle encryption and decryption in client code or upload pipelines.

That operational weight is part of why CMEK is the most common real-world answer for compliance scenarios. It gives organizations the control they need for audits and regulations without forcing them to build and operate their own external key infrastructure. CSEK exists for the cases where even that level of trust in Google Cloud is not acceptable, and those cases are rarer than the exam question volume might suggest.

My Professional Cloud Architect course covers Cloud KMS alongside the rest of the security material.

arrow