diff --git a/content/en/docs/tasks/administer-cluster/encrypt-data.md b/content/en/docs/tasks/administer-cluster/encrypt-data.md
index 7eb9a1f16cf..47d0a79b96a 100644
--- a/content/en/docs/tasks/administer-cluster/encrypt-data.md
+++ b/content/en/docs/tasks/administer-cluster/encrypt-data.md
@@ -154,7 +154,8 @@ The following table describes each available provider:
Key length |
-
+
+
| identity |
None |
@@ -166,6 +167,8 @@ The following table describes each available provider:
Resources written as-is without encryption. When set as the first provider, the resource will be decrypted as new values are written. Existing encrypted resources are not automatically overwritten with the plaintext data.
The identity provider is the default if you do not specify otherwise. |
+
+
| aescbc |
AES-CBC with PKCS#7 padding |
@@ -187,16 +190,6 @@ The following table describes each available provider:
Not recommended for use except when an automated key rotation scheme is implemented. Key material accessible from control plane host. |
- | secretbox |
- XSalsa20 and Poly1305 |
- Strong |
- Faster |
- 32-byte |
-
-
- | Uses relatively new encryption technologies that may not be considered acceptable in environments that require high levels of review. Key material accessible from control plane host. |
-
-
| kms v1 |
Uses envelope encryption scheme with DEK per resource. |
Strongest |
@@ -234,6 +227,16 @@ The following table describes each available provider:
Read how to configure the KMS V2 provider.
+
+ | secretbox |
+ XSalsa20 and Poly1305 |
+ Strong |
+ Faster |
+ 32-byte |
+
+
+ | Uses relatively new encryption technologies that may not be considered acceptable in environments that require high levels of review. Key material accessible from control plane host. |
+