Chapter 5 Encryption on AWS Flashcards

1
Q

Three ways to create keys with KMS

A
  1. KMS
  2. AWS CloudHSM
  3. importing your own key material
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Default key rotation

A

Once a year without having to re-encrypt what was already encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CMK

A

Customer Master Key. Used to control access to your data encryption keys (data keys) and to encrypt and decrypt your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are CMKs stored?

A

Within a CloudHSM in a single region. The CloudHSM is configured for multi tenancy by default, but you can use single tenant if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KMI

A

Key Management Infrastructure. Can be hosted by you or AWS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Caveat of encrypting at block-level or file level

A

Cannot encrypt an EBS boot volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to encrypt RDS data via client side technology?

A

Encrypt data before writing to the DB. You can also add HMAC field to DB so that you query against that value instead of exposing plaintext values in queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

S3 server side encryption mechanism (managed)

A

S3 can encrypt data written to disk in S3. Each object has its own data key. This is offered at no additional charge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain S3 server side encryption via customer provided key

A

You provide key during upload, and S3 uses it to encrypt objects. Then it deletes the provided key. When you download from S3, you provide your key again, and S3 will decrypt object and send it. (no additional cost)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain S3 server side encryption via KMS

A

When you upload object, request sent to KMS for object key. KMS responds with object key in two forms (1. encrypted from master key and 2. plaintext version). Then, S3 encrypts object via plaintext key and deletes the plaintext key. Now S3 holds both the encrypted object and encrypted object key.

When it needs to retrieve an object, S3 sends KMS the encrypted object key. KMS decrypts the object key and returns it. Then S3 can decrypt the object itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

KMI anatomy

A
  1. Storage layer that protects plaintext keys

2. Management layer that authorizes use of stored keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Options for encryption via KMI

A
  1. You control encryption method in addition to the entire KMI
  2. You control the encryption method and the management layer of the KMI, and AWS handles storage layer
  3. AWS controls the encryption method and both components of the KMI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which AWS service provides asymmetric and symmetric encryption capabilities?

A

CloudHSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which feature of AWS Key Management Service (AWS KMS) enables you to use an AWS CloudHSM cluster for the storage of your encryption keys?

A

Custom Key Stores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Difference b/t SSE-S3 and SSE-KMS

A

SSE-S3 does not use KMS (no CMK). SSE-S3 manages encryption keys and performs rotations periodically for you. SSE-S3 is less hands on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are key features of KMS (5 attributes)

A
  1. Centralized key management
  2. Integration with other AWS services
  3. Audit capabilities and high availability
  4. Custom Key Store (within CloudHSM, allows single tenant)
  5. Compliance