PGP (Pretty Good Privacy) encryption ensures secure data transfer between systems. Today, Zeotap CDP uses PGP encryption and decryption to protect batch file-based data during transfer. You can generate PGP-encrypted files using a public key provided by Zeotap CDP. When these files are transferred to Zeotap CDP, they are decrypted before being queued for ingestion. This process maintains data security during transfer.Documentation Index
Fetch the complete documentation index at: https://zeotap-migration1.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
PGP Protocol Version
Zeotap CDP follows RFC 4880 (OpenPGP Message Format) for PGP encryption. Both Zeotap CDP and the client must adhere to this standard for integration. RFC 4880 is used due to the limited adoption of RFC 9580, which is not widely supported.Key Generation and Source Setup
Zeotap CDP generates a pair of asymmetric (public-private) keys for each account. During the source setup process, you can specify which data should be encrypted using PGP. This allows you to enable encryption only for the required and supported source platforms.-
Key Generation - Zeotap CDP’s control plane generates a public and private key pair for your account using an in-house key generator. Below is an example PGP key.
Code
- Source Setup - During source setup, if you select the PGP encryption option, then you can download the public key from the source Implementation Details tab or the admin portal.
Data Encryption and Ingestion
- Encrypting Data - Use the public key provided by Zeotap CDP to encrypt files before placing them in the designated storage bucket (for example, GCS or SFTP).
- File Drop - When the encrypted file is placed in the bucket, a cloud function triggers the decryption process. The private key is used to decrypt the file, and the decrypted data is moved to a raw data bucket for ingestion. Zeotap CDP manages the file drop for pull-based sources (for example, BigQuery, SFTP pull) by automatically placing the file in the appropriate bucket.
Important Considerations
- PGP Clients - Use PGP clients that follow the OpenPGP standard (RFC 4880).
- Session Keys - Ensure your PGP clients have session keys enabled by default for enhanced security.
- Key Management - Maintain proper key management processes for encryption and decryption.