Encrypt the master key to secure it against being compromised and enabling an
attacker to decrypt your keys and other sensitive data.
Master key encryption uses a master key to encrypt other cryptographic keys. These
subordinate keys, in turn, encrypt sensitive data such as passwords or other keys. This
layered approach enhances security. If the master key is compromised, for example, only
the keys and the data it protects are at risk.
On physical and virtual Palo Alto Networks devices, you can configure the master key to
use either the AES-256-CBC or AES-256-GCM encryption algorithm. Both algorithms map to
an encryption level. AES-256-CBC is level 1 and AES-256-GCM is level 2. The
default encryption algorithm is AES-256-CBC. However, AES-256-GCM provides stronger
security and more efficient encryption. AES-GCM provides built-in authentication and
integrity checks, and performance is typically faster than AES-CBC due to support for
parallel processing and hardware acceleration. The master key uses the configured
encryption algorithm to encrypt sensitive data stored on next-generation firewalls
(NGFWs) and Panorama.
If you set the encryption algorithm to AES-256-GCM, you can still use an HSM to encrypt the master key with an
encryption key that is stored on the HSM.
Use AES 256-GCM level 2 for master key encryption.
Use the same encryption level on Panorama and its managed devices, and
use the same encryption level on NGFWs in a high availability (HA) pair. Upgrade devices
to use the strongest possible encryption level. The configuration of managed or paired
devices that use different encryption levels may become out of sync.
Re-encrypt existing encrypted data with the new algorithm.
Leave existing data encrypted with the old encryption algorithm and use the new algorithm only
for new (future) encryptions.
By default, when you change the encryption algorithm, the device uses the new algorithm to
re-encrypt existing encrypted data as well as to encrypt new data. If you manage
devices with Panorama, they may be on different versions of PAN-OS and may not
support the newest encryption algorithms. Be sure you understand which encryption
algorithms Panorama and its managed devices support before you change the encryption
algorithm or re-encrypt data that has already been encrypted.
High Availability (HA) Pair Considerations
The master key on each NGFW in a high availability (HA) pair must be
identical. You'll need to manually enter the master key on each NGFW.
For more information, see Configure a Master Key.
Both NGFWs in an HA pair must use the same encryption algorithm to avoid
becoming out of sync.
Use AES-256-GCM encryption on both NGFWs in the HA pair.
Master Key Encryption Logs
The firewall generates System logs (MonitorLogsSystem) when you change the master key encryption algorithm (level) and for
reencryption events.
To view all of the System Logs for master key encryption, create a filter that shows
all logs of the Type crypto: (subtype eq
crypto).