Skip to main content
Gossip Encryption is the final objective in the Consul Certified Associate curriculum. In this section, we’ll dive into how to secure Consul’s internal communications by:
  1. Reviewing the Consul Security Threat Model
  2. Configuring Gossip Encryption on an existing data center
  3. Managing the lifecycle of Gossip Encryption keys for day-two operations
The image outlines objectives for using gossip encryption, including understanding the Consul security model, configuring encryption for a data center, and managing encryption keys. It also indicates a difficulty level of 2 out of 5.
If you need a deeper dive into the Consul Security Threat Model, review the Consul Security Threat Model guide before proceeding.
We’ll begin with a concise recap of the Threat Model, then move on to:
  • Enabling Gossip Encryption on a running Consul cluster
  • Rotating and retiring encryption keys over time
Let’s get started!