AWS - KMS Flashcards
What level of compliance does KMS provide by default?
FIPS 140-2 (L2)
FIPS = Federal Information Processing Standard
What is an HSM?
Hardware security modules (HSMs)
- Hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates.
What is CloudHSM?
- Similar to KMS, but gives you a higher level of security compliance.
- With CloudHSM, AWS manages the hardware, but they have NO ACCESS to the part of the hardware where keys are stored and managed. It’s actually a physically tamper-resistant piece of hardware that only YOU have access to.
What level of security compliance does CloudHSM provide?
CloudHSM is FIPS 140-2 Level 3 compliant, vs KMS by itself which is only Level 2 compliant.
What API standards do you use to communicate with CloudHSM?
With CloudHSM, you use industry-standard APIs, such as PKCS#11, Java Cryptography Extensions (JCE), or Microsoft CryptoNG (CNG) libraries
How should you configure CloudHSM if you need high availability?
- AWS deploys CloudHSMs are inside their own VPC - not in any VPC that you control.
- AWS deploys one CloudHSM in each AZ to provide high availability, since one HCM device is not a highly available device.
- These HSMs get configured as a cluster, so keys, policies, configurations, etc. get auto-replicated between them.
- AWS provides you with one Elastic Network Interface (ENI) for each HSM (one per AZ).
- If you want high availability, you have to configure each of your interfaces to load-balance across the various ENIs.
- Note that you also have to install the CloudHSM client on each EC2 instance to use CloudHSM.