KMS Flashcards
Resilience of KMS
Regionally and Public Service (within in AWS Public Zone, but still requires permissions to access the service)
Main role of KMS
Create, Store and Manage Keys.
KMS is used for
Encryption and decryption (plain text to cipher text and vice versa)
features of KMS
Supports both asymmetric and symmetric encryption Cryptographic operations (encryptions and decryption)
Security of KMS
Keys never leave KMS
Provides FIPS 140-2 (L2) US security standard.
Uses of CMK
KMS uses CMKs for cryptographic operations, also used by user, application and AWS services.
CMK is
Logical and it is just a container which has the physical backing key.
CMK contains
Key Policy Key ID Key Date Description State (active or inactive) Key
Features of CMK
CMK contain physical backing key which is managed by KMS and used for cryptographic operations.
Physical key can be imported or generated by KMS.
Can be used to perform cryptographic operations on data of size 4KB.
Security of CMK
CMK is restricted within KMS (in a particular region created) and cannot be extracted outside KMS.
Types of CMK and Key rotation.
AWS Managed CMK (Completely managed by AWS)
Key Rotated - Once in 3 years (Enabled by default)
Customer Managed CMK (Can edit the key policy to allow other AWS accounts to access our key)
Key Rotated - Once a year. (Optional to enable or disable)
What is Key rotation ?
Process of changing the physical backing key.
CMK will retain all the previous keys and the current keys.
Alias
Can create a alias for CMK (Regionally Resilient)
Working of CMK and KMS
Choose a region and create a new key which will creates CMK using createKey operation (creates a container contains a physical backing key)
This is what KMS Creates,Stores and Manages.
CMKs are not stored without encryption on disk permanently.
Encryption using CMK
User will request Encrypt Operation by providing data and specifying the CMK and KMS accepts the data assuming the user has permissions to perform encrypt
operation.
Then decrypts the key and uses the key along with the data to generate cipher text.