Cloud KMS for the PDE Exam: When to Use Over Default Encryption

GCP Study Hub
619c7c8da6d7b95cf26f6f70
May 2, 2026

Encryption is one of those topics where the Professional Data Engineer exam can feel deceptively simple. Every storage service on Google Cloud encrypts data at rest by default, so why would you ever need anything else? The answer to that question is exactly what gets tested, and Cloud KMS is the service at the center of it. In this article I want to walk through how I think about Cloud KMS for the Professional Data Engineer exam, when to pick it over the default encryption Google provides, and the specific signals in a question stem that should push you toward a customer-managed key.

What Cloud KMS actually is

Cloud KMS stands for Key Management Service. It is the Google Cloud product that lets you create, use, rotate, and destroy cryptographic keys. That short list of verbs is worth memorizing because it is the lifecycle the exam expects you to associate with KMS. Anything that involves controlling the lifetime of a key, scheduling rotations, disabling a key in response to an incident, or destroying key material so that data becomes unrecoverable lives inside Cloud KMS.

The reason Cloud KMS exists is regulatory. Encryption key management is critical for meeting industry regulations around data security, and a lot of organizations cannot accept a model where Google holds the only copy of the keys. KMS gives them a way to hold those keys themselves while still letting Google Cloud services use them transparently.

The Cloud KMS hierarchy

Cloud KMS has three levels you should be able to name on the exam.

  • Key ring. A container that groups keys together. Key rings live in a specific Google Cloud location, and that location is fixed at creation time.
  • Key. A cryptographic key inside a key ring. The key has a purpose, such as symmetric encryption, and a rotation policy.
  • Key version. The actual cryptographic material. When you rotate a key, you are creating a new key version. Old versions can stay enabled for decrypting older data, or you can disable and destroy them.

Two things to lock in. First, key rings cannot be moved across locations. If a question describes a team that needs keys in a new region, the right answer is to create a new key ring there, not to migrate. Second, key versions are the unit of rotation. The key itself is a stable identifier that your applications and services point at. Rotation swaps out the underlying version while the key reference stays the same.

Default encryption versus customer-managed encryption

Every service that stores data on Google Cloud encrypts it at rest by default. That includes Cloud Storage, BigQuery, Cloud SQL, Pub/Sub, Dataflow temp data, and the rest of the data platform. The keys for this default encryption are created, rotated, and destroyed entirely by Google. You do not pay extra for it and you do not configure anything.

Customer-managed encryption keys, usually called CMEK, replace the Google-managed key with a key you create and control in Cloud KMS. The data is still encrypted using the same envelope encryption model, but the key-encryption-key is one you own. You decide when it rotates. You decide when to disable or destroy it.

On the exam, the trigger for CMEK is almost always one of two things.

  • A compliance or regulatory requirement. Healthcare under HIPAA, finance, government workloads, and anything touching personal data under GDPR are the canonical examples. If the stem mentions any of these and asks how to meet the encryption requirements, CMEK via Cloud KMS is the answer.
  • A need to revoke access to data. If the organization needs the ability to make encrypted data unrecoverable on demand, that requires control over the key. With default encryption you cannot do that because Google controls the key. With CMEK you can disable or destroy the key version, and the encrypted data becomes unreadable.

If neither of those signals is present, default encryption is almost always the right call. It is free, it is automatic, and the exam is not trying to trick you into adding CMEK just because it sounds more secure.

Rotation and locations

Key rotation on Cloud KMS can be automatic on a schedule you set, or manual. A common pattern for symmetric keys is a rotation period of 90 days. The exam does not usually ask for an exact number, but it does expect you to know that rotation is a first-class feature of KMS and a key reason to choose it.

Locations matter for two reasons. First, the key ring location should match the data location to avoid cross-region calls and to satisfy data residency rules. If your BigQuery dataset is in the EU multi-region, the CMEK protecting it needs a key ring in a compatible EU location. Second, some compliance regimes require that keys never leave a specific jurisdiction, which is another nudge toward CMEK with carefully chosen locations.

How to answer KMS questions on the exam

When a Professional Data Engineer question describes an encryption scenario, I run through a short checklist. Does the stem mention a specific regulation or industry like healthcare, finance, government, or GDPR? Does it describe a need to revoke or destroy data by destroying the key? Does it talk about controlling rotation? If any of those are true, the answer involves Cloud KMS with customer-managed keys. If none of them are true and the stem just says data needs to be encrypted at rest, default encryption is fine and adding KMS is over-engineering.

My Professional Data Engineer course covers Cloud KMS alongside the rest of the security and compliance topics on the exam, including IAM, VPC Service Controls, and how encryption choices interact with services like BigQuery, Cloud Storage, and Dataflow.

Get tips and updates from GCP Study Hub

arrow