Cloud Storage Encryption for the PCA Exam: Default, KMS, CSEK

GCP Study Hub
Ben Makansi
April 30, 2026

Encryption is one of those topics where the Professional Cloud Architect exam expects you to know which option fits which constraint. Cloud Storage gives you three encryption paths, and each one shifts a different amount of work and control between you and Google. I want to walk through all three so you can recognize them on the exam and pick the right answer when a question asks about compliance, key ownership, or operational simplicity.

Default encryption with Google-managed keys

Every object you write to Cloud Storage is encrypted at rest. You do not configure it, you do not opt in, and you cannot turn it off. Google manages the keys, rotates them, and handles the entire lifecycle on your behalf. This is the baseline, and for most workloads it is enough.

The reason this matters for the Professional Cloud Architect exam is that you need to recognize when default encryption is the right answer. If a question describes a team that wants their data encrypted at rest with minimal operational overhead, and there is no compliance requirement around key ownership, default encryption is the answer. There is nothing to set up, nothing to rotate, and nothing to manage. Google does it.

The trade-off is control. You do not own the keys, you cannot revoke them, and you cannot bring your own. If your organization or a regulator requires you to manage the encryption keys yourself, default encryption will not satisfy that requirement and you need one of the other two options.

Customer-managed encryption keys with Cloud KMS

The next step up is creating your own key in Cloud Key Management Service and setting it as the default for a Cloud Storage bucket. This is called a Customer-Managed Encryption Key, or CMEK. The key lives in Cloud KMS, you control it, and Cloud Storage uses it to encrypt and decrypt objects in that bucket.

What you actually own with a CMEK is the lifecycle. There are four pieces I want you to remember because the exam likes to test them.

Creation is the first step. You generate the key in Cloud KMS, in a key ring you choose, in a region you choose. Usage happens automatically once you bind the key to the bucket. As objects are written, Cloud Storage calls KMS to wrap the data encryption key with your CMEK. As objects are read, KMS unwraps it. You do not write code for this, you just authorize Cloud Storage to use the key.

Rotation is where CMEK earns its keep. You can rotate manually, or you can configure Cloud KMS to rotate the key on a schedule. Old versions of the key remain available to decrypt data that was encrypted under them, while new writes use the new version. This is what lets you meet rotation policies that default encryption cannot prove.

Revocation is the most important property for the exam. Because you own the key, you can disable or destroy it. If you disable a CMEK, every object encrypted with that key becomes unreadable until you re-enable it. This is the answer to questions about emergency key revocation or right-to-be-forgotten requirements where you need to make data inaccessible without going object by object.

The cost of CMEK is operational. You are now responsible for the key, which means you need to think about who has permission to use it, what happens if it is destroyed, and how rotation interacts with your applications. Cloud KMS does most of the heavy lifting, but the responsibility shifts onto you.

Customer-supplied encryption keys

The third option is Customer-Supplied Encryption Keys, or CSEK. With CSEK you do not store the key in Google Cloud at all. You generate it on your own systems, you keep it on your own systems, and you supply it to Cloud Storage on every API request that needs to encrypt or decrypt an object.

The flow looks like this. You have an on-premises system where the key is generated and stored. When you upload a file with gsutil, you point it at a configuration file called .boto that contains the key. The gsutil tool reads the key from the .boto file, includes it in the upload request, and Cloud Storage uses it to encrypt the object before writing it to disk. The key itself is never persisted in Cloud Storage. Only the encrypted object is stored.

The same applies on the read path. To download or decrypt the object, you supply the same key with the request. If you lose the key, the data is gone. There is no recovery, because Google does not have a copy.

This is the highest control option and also the highest operational burden. You manage key generation, key storage, key distribution to whoever needs to read the data, and key rotation if you choose to rotate. The Professional Cloud Architect exam tends to test CSEK in scenarios where a customer says something like "the encryption keys must never leave our premises" or "Google must not have access to our keys at any time." Default encryption fails that test. CMEK fails it too, because the key lives in Cloud KMS, which is a Google service. Only CSEK satisfies a requirement where the key has to remain entirely under customer control.

How to recognize each option on the exam

When a Professional Cloud Architect question asks about Cloud Storage encryption, the easiest way to pick the answer is to look at where the key lives and who manages it.

If the question says nothing about key control or compliance, default encryption is fine. Google manages everything, you do nothing. If the question mentions compliance with a standard that requires customer-managed keys, key rotation policies, or the ability to revoke access by destroying a key, that is CMEK with Cloud KMS. If the question mentions that keys must remain on-premises, that the customer must supply the key with every request, or that Google must not store the key, that is CSEK.

The other clue is the .boto file. If you see .boto or gsutil in the question, the answer is almost always CSEK, because that is the configuration mechanism for supplying customer keys to gsutil during uploads.

My Professional Cloud Architect course covers Cloud Storage encryption alongside the rest of the storage and analytics material.

Get tips and updates from GCP Study Hub

arrow