Advertisers can now use "attestation" for confidential matching and have the option to encrypt their data using customer-owned encryption keys managed by Google Cloud Key Management Service (GCP KMS). This feature incurs a nominal cost. The "Linked accounts" page has been upgraded to the "Data manager" page in Google Ads for linking product accounts and connecting to data sources.
Confidential Matching with Encryption
Confidential matching uses confidential computing to match first-party data from advertisers with Google data to create audience lists. This feature is now available to all Google Ads Data Manager users for Customer Match and is the default technique for creating audience lists. It supports creating audience lists from encrypted data as an optional feature.
Process Overview
To use encrypted data with Data Manager:
- Set up your encryption environment: Create a Key Encryption Key (KEK) in Cloud KMS, set up a Workload Identity Pool (WIP) provider, and configure key decrypter permissions.
- Encrypt your data: Format, hash, and encrypt personally identifiable information (PII) data fields.
- Upload the encrypted data: Upload to a supported data source.
- Connect to your encrypted data source: Use Data Manager to connect and map fields.
Setting Up Your Environment
- Create key resources:
- Create a key ring and a key in Cloud KMS.
- Create workload identity pool resources:
- Create a Workload Identity Pool (WIP) and a provider.
- Configure key decrypter permission: Use the WIP to configure key decrypter permissions.
- Optional: Enable audit logs: Enable audit logs for IAM API, KMS API, and Security Token Service API.
- Get WIP provider name: Retrieve the WIP provider name for use during connection setup.
Encrypting Your Data
- Format PII fields: Ensure fields like email, phone, first name, last name, country code, and zip code are properly formatted.
- Hash and encode PII fields: Use SHA-256 hash function and Base64 encoding.
- Encrypt the data: Use XChaCha20Poly1305 DEK and encode as Base64.
Example Application
An example Java application is provided to format, hash, and encrypt data, producing a formatted and encrypted CSV file compatible with Data Manager’s file-based connectors.
Using Your Encrypted Data
- Upload the encrypted data: Upload the output file to a supported data source.
- Connect to the data source: Use Data Manager to select the encrypted file, enter the WIP provider name, and map the fields.
For more detailed instructions, refer to the Google Cloud documentation and the provided examples.