We are currently using Percona keyring_vault to enable TDE on the database while storing the encryption key in HashiCorp Vault. According to the keyring_vault documentation, one will need to generate a token in Vault set with specific policies and place it within the token parameter of keyring_vault.conf.
First question: Since the token is stored in a file directly on the server, is restricting the access of the configuration file to the mysql user (using chown) sufficient in terms of security? If someone were to take a copy of the hard disk, it is possible that they could have access to the token and, thus, decrypt the data stored in Percona.
Second question: What is the best practice when providing tokens generated from HashiCorp Vault to Percona? According to this blog post in 2018, a token is generated manually in HashiCorp Vault. However, HashiCorp seems to suggest using an authentication to verify a client which then allows a token to be generated.