SlideShare a Scribd company logo
1 of 45
Download to read offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Achieving security goals with AWS
CloudHSM
Avni Rambhia
Senior Product Manager
AWS Cryptography
Amazon Web Services
S D D 3 3 3
Stephen Quigg
Principal Security SA
AWS Financial Services
Amazon Web Services
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
AWS cryptography services: Choosing the right tool for the job
AWS CloudHSM fundamentals
Designing for resilience with cross-Region redundancy
Optimizing performance and cost
Recent launches for CloudHSM and what’s on the roadmap
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Related breakouts
FND320: Root CA Hierarchies for AWS Certificate Manager
Private CA
4:15-5:15 Wednesday (205B)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cryptography: What, how, and why
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS cryptography services
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS KMS
Your applications
AWS
services
Authentication
Authorization
Logging
KMS custom key
store
Your AWS
CloudHSM cluster
Native KMS
Shared HSM
Your on-
premises HSM
(BYOK)
Imported to
AWS KMS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
The AWS Encryption SDK
• Framework and data format for client-side encryption
• Library that gives you authenticated envelope encryption
• Backed by AWS KMS or external key sources
• Implementations available for Java, C, and Python
• Specification is available if you want to implement in a different
language
• Supports data key caching
• Open source under Apache 2.0 license
• Built on language-specific crypto primitives
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
ACM Private CA
Organization
resources
On-premises servers
AWS resources
Devices
Amazon EC2
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Life-cycle management for secrets such as database credentials
and API keys
Rotate secrets safely Pay as you goManage access with
fine-grained policies
Secure and audit
secrets centrally
Secrets Manager
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Aspects of control in CloudHSM
Control
Application
development
Algorithms and
key lengths
User management
Specific
compliance
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Control implies responsibility
Control
Application
development
Algorithms
and key
lengths
User
management
Specific
compliance
Responsibility
Application
integration
HSM
maintenance
Backups
ProvisioningHigh availability
User
management
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudHSM simplifiesmanagement tasks
Responsibility
Application
integration
HSM
maintenance
Backups
Provisioning
High
availability
User
management
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Concepts in CloudHSM
• Cluster
• HSM
• Backup
• Higher throughput: Expand cluster
• More active keys: New cluster
CloudHSM HSM
CloudHSM HSM
Synchronized
CloudHSM cluster
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Concepts in CloudHSM, continued
• Cloned cluster
• Same trust hierarchy and masking key
• Can synchronize keys within FIPS envelope
Automatically
synchronized
CloudHSM cluster
Create cluster
from backup
Cloned CloudHSM
cluster
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Two ways to use CloudHSM
• HSM-based master key unlocks data keys (e.g.,
database TDE)
• Durability is primary concern
Direct transactions
• HSM is in path of every transaction (e.g.,
OpenSSL)
• Availability and latency are critical
Master key
stored in
HSM
Data keys are encrypted
with master key
Envelope encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Meet the characters
Service API: Manage your cluster
• Console
• Command line
• Shows in AWS CloudTrail
CLI tools: Use your HSMs
• CloudHSM_mgmt_util – HSM
administration
• Key_mgmt_util – Convenient for
infrequent key operations
SDKs: Application development
• PKCS#11
• OpenSSL
• JCE
Client Daemon: Talks to cluster
• Used by key_mgmt_util and SDKs
to interact with cluster
• Handles load balancing
• Is aware of cluster configuration
changes
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudHSM_mgmt_util: Closer look
• Global mode: Default
• Talks sequentially to all HSMs in the cluster
• Doesn’t use client daemon: “Configure –m” before using the utility to update cluster settings
• Use this mode for routine operations
• Server mode: Use wisely
• Bypass cluster synchronization
• Talk to one HSM at a time
• Great power, great responsibility
• Use this mode as needed (e.g. to fix mismatched users or passwords or to manually synchronize keys
across cloned clusters)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cross-region redundant workloads
Cloning allows secure cross-Region key replication
Step 1:
Copy backup to
new region
Step 2:
Create cluster
from backup
Ongoing:
Synchronize new
keys
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cross-region key transfer using wrapping
Region 1
CloudHSM
cluster
Create cluster
from backup
Region 2
CloudHSM
cluster
AESWrap newKey
with wrappingKey
AESUnwrap newKey
with wrappingKey
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cross-region key transfer using maskedObjects
Region 1
CloudHSM
cluster
Create cluster
from backup
Region 2
CloudHSM
cluster
extractMaskedObject
insertMaskedObject
key_mgmt_util
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Syncing with Key_mgmt_util
[ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s
user1 -p pwd findKey
Command: findKey
Total number of keys present: 3
Number of matching keys from start index 0::2
Handles of matching keys:
6, 262151, 8
[ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s
user1 -p pwd extractMaskedObject -o 262151 -out masked_object.file
Command: extractMaskedObject -o 262151 -out masked_object.file
Object was masked and written to file "masked_object.file“
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Syncing with Key_mgmt_util
[ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s
user1 -p pwd insertMaskedObject -f masked_object.file
Command: insertMaskedObject -f masked_object.file
Cfm3InsertMaskedObject returned: 0x00 : HSM Return: SUCCESS
New Key Handle: 262153
Node id 1 and err state 0x00000000 : HSM Return: SUCCESS
[ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s
user1 -p pwd findKey
Command: findKey
Total number of keys present: 4
Number of matching keys from start index 0::3
Handles of matching keys:
6, 262151, 8, 262153
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Masking vs. wrapping
Wrapping
Required for use within applications
Pros
• Can be automated in C/Java
• Can be used in any cluster where
wrapping key is loaded
Cons
• Does not work for non-
exportable keys
• Key attributes in new HSM
depend on unwrapping code
Masking
Required for non-exportable keys
Pros
• Key stays in FIPS boundary
• Constrained to cloned cluster
• Key retains attributes and policies
Cons
• Only usable via command line tools
(today)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding HSM performance
Transaction = network round-trip + operation + (sometimes) synchronization
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding HSM performance
Transaction = network round-trip + operation + (sometimes) synchronization
Multi-threading
increases throughput
for given latency
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding HSM performance
Transaction = network round-trip + operation + (sometimes) synchronization
• Cryptographic operations on a key
handle give you maximum speed
• Attributes and labels require look up,
adding latency
• Caching the handle for frequently
used keys provides better speed
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding HSM performance
Transaction = network round-trip + operation + (sometimes) synchronization
Two types of keys in the HSM:
• Token keys are persistent, synchronized
to all HSMs in the cluster
• Session keys are created on one HSM
and erased after the session
• You can create and unwrap keys as
session or token keys
• Session keys offer lower latency but no
durability
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cluster performance: When to add HSMs
During design:
• For reliability: 2+ HSMs per production cluster, spread across AZs
• For speed: As needed after threading and code optimization
At runtime:
• When latency of calls increases
Amazon CloudWatch metrics:
• HSMs with unhealthy metrics are autoreplaced by CloudHSM
• For missing metrics, consider proactively adding an HSM
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Best practices for cost management
For development and test workloads:
• Pause billing: Delete HSM instances at the end of the workday
• Resume work: Create HSM instance to pick up where you left off
For production workloads:
• Leverage elasticity: Scale cluster up/down as workload varies
• Maximize utilization: Share lightly used cluster across accounts
• Optimize storage: Wrap data keys and store externally when not in use
Idle workloads: Draw down cluster to 0 HSMs; even delete cluster
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Last year, we delivered:
• Client support for Microsoft Windows
• ADCA, IIS and Signtool integations
• JCE samples on GitHub:
https://github.com/aws-samples/aws-cloudhsm-jce-examples/
• Basic usage, optimizing performance, and handling HSM disconnects gracefully
• More code coming soon, contributions welcome!
• PKCS 2.40 compliance
• Client 1.1.1 onward
• Backup management
• Copy and Delete
• HSM Audit logs in CloudWatch
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
HSM audit logs in CloudWatch
User and key management is logged today
• Create/delete user and change password
• Login and logout
• Create/delete key and wrap/unwrap key
• Share key
Cryptographic operations are not logged today
• Encrypt, decrypt, sign, verify
Each HSM emits its own log stream
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudHSM as custom key store for AWS KMS
Combines CloudHSM’s control with AWS KMS integrations
• Use CloudHSM-backed keys in most AWS services via AWS KMS
• One data protection pattern, multiple compliance levels
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC
CloudHSM cluster
Customers’
applications
via AWS SDKs
AWS KMS standard
key store
AWS KMS
KMS endpoint
AWS KMS custom key store
KMS HSM fleet
50+ AWS
services
AWS Cloud
Custom key store
“connector”
Custom
clients using
PKCS#11, JCE, CNG
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
KMS
KMS BYOK
(ImportKey)
KMS CustomKeyStore
(CloudHSM)
Where keys are generated HSMs controlled by AWS HSMs controlled by you HSMs controlled by you
Where keys are stored HSMs controlled by AWS HSMs controlled by AWS HSMs controlled by you
Where keys are used HSMs controlled by AWS HSMs controlled by AWS HSMs controlled by you
How to control key use JSON key policies you
define
JSON key policies you
define
JSON key policies you
define
Responsibility for
performance/scale
AWS AWS You
Integration with AWS
services?
Yes Yes Yes
Pricing model $1/key + usage $1/key + usage $1/key + usage;
Hourly charge for each HSM
Comparison of AWS KMS master key providers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Avni Rambhia
arambhia@amazon.com
Stephen Quigg
squigg@amazon.com

More Related Content

What's hot

Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019
Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019 Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019
Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019 Amazon Web Services
 
Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019
Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019 Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019
Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019 Amazon Web Services
 
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Amazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Amazon Web Services
 
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...Amazon Web Services
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Amazon Web Services
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...Amazon Web Services
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Amazon Web Services
 
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Amazon Web Services
 
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019 Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019 Amazon Web Services
 
New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...Amazon Web Services
 
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019 Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019 Amazon Web Services
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
 
Serverless identity management, authentication, and authorization - SDD405-R ...
Serverless identity management, authentication, and authorization - SDD405-R ...Serverless identity management, authentication, and authorization - SDD405-R ...
Serverless identity management, authentication, and authorization - SDD405-R ...Amazon Web Services
 
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019 Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019 Amazon Web Services
 
Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...Amazon Web Services
 
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...Bhavin Desai, CCIE Security
 
Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Amazon Web Services
 

What's hot (20)

Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019
Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019 Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019
Securing your block storage on AWS - GRC207 - AWS re:Inforce 2019
 
Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019
Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019 Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019
Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019
 
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
 
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
 
Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...Identity and access control for custom enterprise applications - SDD412 - AWS...
Identity and access control for custom enterprise applications - SDD412 - AWS...
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
 
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
 
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019 Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
 
New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...
 
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019 Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
Serverless identity management, authentication, and authorization - SDD405-R ...
Serverless identity management, authentication, and authorization - SDD405-R ...Serverless identity management, authentication, and authorization - SDD405-R ...
Serverless identity management, authentication, and authorization - SDD405-R ...
 
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019 Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
 
Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...Scale permissions management in AWS with attribute-based access control - SDD...
Scale permissions management in AWS with attribute-based access control - SDD...
 
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
AWS re:Inforce 2019 Builders session: Simplify and secure your network archit...
 
Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...
 

Similar to Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019

Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018
Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018
Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018Amazon Web Services
 
利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統Amazon Web Services
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...Amazon Web Services
 
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019 Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019 Amazon Web Services
 
Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019Devoteam Revolve
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDayAmazon Web Services
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019 Amazon Web Services
 
Security hardening of core AWS services
Security hardening of core AWS servicesSecurity hardening of core AWS services
Security hardening of core AWS servicesRuncy Oommen
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day OneAmazon Web Services
 
2019 community day__chennai_aws_secrets_manager_v0.1.pptx
2019 community day__chennai_aws_secrets_manager_v0.1.pptx2019 community day__chennai_aws_secrets_manager_v0.1.pptx
2019 community day__chennai_aws_secrets_manager_v0.1.pptxVijayaNirmalaGopal
 
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...Amazon Web Services
 
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAmazon Web Services
 
Using AWS Key Management Service for Secure Workloads
Using AWS Key Management Service for Secure WorkloadsUsing AWS Key Management Service for Secure Workloads
Using AWS Key Management Service for Secure WorkloadsAmazon Web Services
 
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdfSecuring Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdfAmazon Web Services
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountAmazon Web Services
 
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day OneAWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day OneAWS Germany
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Amazon Web Services
 

Similar to Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019 (20)

Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018
Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018
Deep Dive on AWS CloudHSM (SEC358-R1) - AWS re:Invent 2018
 
利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統利用 Fargate - 無伺服器的容器環境建置高可用的系統
利用 Fargate - 無伺服器的容器環境建置高可用的系統
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
 
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019 Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
Data encryption concepts in AWS - FND302 - AWS re:Inforce 2019
 
Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019Meetup Sécurité - AWS - Recap Reinforce 2019
Meetup Sécurité - AWS - Recap Reinforce 2019
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDay
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
Security hardening of core AWS services
Security hardening of core AWS servicesSecurity hardening of core AWS services
Security hardening of core AWS services
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
How AI is disrupting the world
How AI is disrupting the world How AI is disrupting the world
How AI is disrupting the world
 
2019 community day__chennai_aws_secrets_manager_v0.1.pptx
2019 community day__chennai_aws_secrets_manager_v0.1.pptx2019 community day__chennai_aws_secrets_manager_v0.1.pptx
2019 community day__chennai_aws_secrets_manager_v0.1.pptx
 
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
 
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
 
Using AWS Key Management Service for Secure Workloads
Using AWS Key Management Service for Secure WorkloadsUsing AWS Key Management Service for Secure Workloads
Using AWS Key Management Service for Secure Workloads
 
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdfSecuring Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day OneAWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Achieving security goals with AWS CloudHSM Avni Rambhia Senior Product Manager AWS Cryptography Amazon Web Services S D D 3 3 3 Stephen Quigg Principal Security SA AWS Financial Services Amazon Web Services
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda AWS cryptography services: Choosing the right tool for the job AWS CloudHSM fundamentals Designing for resilience with cross-Region redundancy Optimizing performance and cost Recent launches for CloudHSM and what’s on the roadmap
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Related breakouts FND320: Root CA Hierarchies for AWS Certificate Manager Private CA 4:15-5:15 Wednesday (205B)
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cryptography: What, how, and why
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS cryptography services
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS KMS Your applications AWS services Authentication Authorization Logging KMS custom key store Your AWS CloudHSM cluster Native KMS Shared HSM Your on- premises HSM (BYOK) Imported to AWS KMS
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. The AWS Encryption SDK • Framework and data format for client-side encryption • Library that gives you authenticated envelope encryption • Backed by AWS KMS or external key sources • Implementations available for Java, C, and Python • Specification is available if you want to implement in a different language • Supports data key caching • Open source under Apache 2.0 license • Built on language-specific crypto primitives
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. ACM Private CA Organization resources On-premises servers AWS resources Devices Amazon EC2
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Life-cycle management for secrets such as database credentials and API keys Rotate secrets safely Pay as you goManage access with fine-grained policies Secure and audit secrets centrally Secrets Manager
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Aspects of control in CloudHSM Control Application development Algorithms and key lengths User management Specific compliance
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Control implies responsibility Control Application development Algorithms and key lengths User management Specific compliance Responsibility Application integration HSM maintenance Backups ProvisioningHigh availability User management
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. CloudHSM simplifiesmanagement tasks Responsibility Application integration HSM maintenance Backups Provisioning High availability User management
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Concepts in CloudHSM • Cluster • HSM • Backup • Higher throughput: Expand cluster • More active keys: New cluster CloudHSM HSM CloudHSM HSM Synchronized CloudHSM cluster
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Concepts in CloudHSM, continued • Cloned cluster • Same trust hierarchy and masking key • Can synchronize keys within FIPS envelope Automatically synchronized CloudHSM cluster Create cluster from backup Cloned CloudHSM cluster
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Two ways to use CloudHSM • HSM-based master key unlocks data keys (e.g., database TDE) • Durability is primary concern Direct transactions • HSM is in path of every transaction (e.g., OpenSSL) • Availability and latency are critical Master key stored in HSM Data keys are encrypted with master key Envelope encryption
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Meet the characters Service API: Manage your cluster • Console • Command line • Shows in AWS CloudTrail CLI tools: Use your HSMs • CloudHSM_mgmt_util – HSM administration • Key_mgmt_util – Convenient for infrequent key operations SDKs: Application development • PKCS#11 • OpenSSL • JCE Client Daemon: Talks to cluster • Used by key_mgmt_util and SDKs to interact with cluster • Handles load balancing • Is aware of cluster configuration changes
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. CloudHSM_mgmt_util: Closer look • Global mode: Default • Talks sequentially to all HSMs in the cluster • Doesn’t use client daemon: “Configure –m” before using the utility to update cluster settings • Use this mode for routine operations • Server mode: Use wisely • Bypass cluster synchronization • Talk to one HSM at a time • Great power, great responsibility • Use this mode as needed (e.g. to fix mismatched users or passwords or to manually synchronize keys across cloned clusters)
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cross-region redundant workloads Cloning allows secure cross-Region key replication Step 1: Copy backup to new region Step 2: Create cluster from backup Ongoing: Synchronize new keys
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cross-region key transfer using wrapping Region 1 CloudHSM cluster Create cluster from backup Region 2 CloudHSM cluster AESWrap newKey with wrappingKey AESUnwrap newKey with wrappingKey
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cross-region key transfer using maskedObjects Region 1 CloudHSM cluster Create cluster from backup Region 2 CloudHSM cluster extractMaskedObject insertMaskedObject key_mgmt_util
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Syncing with Key_mgmt_util [ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s user1 -p pwd findKey Command: findKey Total number of keys present: 3 Number of matching keys from start index 0::2 Handles of matching keys: 6, 262151, 8 [ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s user1 -p pwd extractMaskedObject -o 262151 -out masked_object.file Command: extractMaskedObject -o 262151 -out masked_object.file Object was masked and written to file "masked_object.file“
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Syncing with Key_mgmt_util [ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s user1 -p pwd insertMaskedObject -f masked_object.file Command: insertMaskedObject -f masked_object.file Cfm3InsertMaskedObject returned: 0x00 : HSM Return: SUCCESS New Key Handle: 262153 Node id 1 and err state 0x00000000 : HSM Return: SUCCESS [ec2-user@ip-X-X-X-X ~]$ /opt/cloudhsm/bin/key_mgmt_util singlecmd loginHSM -u CU -s user1 -p pwd findKey Command: findKey Total number of keys present: 4 Number of matching keys from start index 0::3 Handles of matching keys: 6, 262151, 8, 262153
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Masking vs. wrapping Wrapping Required for use within applications Pros • Can be automated in C/Java • Can be used in any cluster where wrapping key is loaded Cons • Does not work for non- exportable keys • Key attributes in new HSM depend on unwrapping code Masking Required for non-exportable keys Pros • Key stays in FIPS boundary • Constrained to cloned cluster • Key retains attributes and policies Cons • Only usable via command line tools (today)
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding HSM performance Transaction = network round-trip + operation + (sometimes) synchronization
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding HSM performance Transaction = network round-trip + operation + (sometimes) synchronization Multi-threading increases throughput for given latency
  • 34. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding HSM performance Transaction = network round-trip + operation + (sometimes) synchronization • Cryptographic operations on a key handle give you maximum speed • Attributes and labels require look up, adding latency • Caching the handle for frequently used keys provides better speed
  • 35. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding HSM performance Transaction = network round-trip + operation + (sometimes) synchronization Two types of keys in the HSM: • Token keys are persistent, synchronized to all HSMs in the cluster • Session keys are created on one HSM and erased after the session • You can create and unwrap keys as session or token keys • Session keys offer lower latency but no durability
  • 36. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cluster performance: When to add HSMs During design: • For reliability: 2+ HSMs per production cluster, spread across AZs • For speed: As needed after threading and code optimization At runtime: • When latency of calls increases Amazon CloudWatch metrics: • HSMs with unhealthy metrics are autoreplaced by CloudHSM • For missing metrics, consider proactively adding an HSM
  • 37. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Best practices for cost management For development and test workloads: • Pause billing: Delete HSM instances at the end of the workday • Resume work: Create HSM instance to pick up where you left off For production workloads: • Leverage elasticity: Scale cluster up/down as workload varies • Maximize utilization: Share lightly used cluster across accounts • Optimize storage: Wrap data keys and store externally when not in use Idle workloads: Draw down cluster to 0 HSMs; even delete cluster
  • 38. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 39. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Last year, we delivered: • Client support for Microsoft Windows • ADCA, IIS and Signtool integations • JCE samples on GitHub: https://github.com/aws-samples/aws-cloudhsm-jce-examples/ • Basic usage, optimizing performance, and handling HSM disconnects gracefully • More code coming soon, contributions welcome! • PKCS 2.40 compliance • Client 1.1.1 onward • Backup management • Copy and Delete • HSM Audit logs in CloudWatch
  • 40. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. HSM audit logs in CloudWatch User and key management is logged today • Create/delete user and change password • Login and logout • Create/delete key and wrap/unwrap key • Share key Cryptographic operations are not logged today • Encrypt, decrypt, sign, verify Each HSM emits its own log stream
  • 41. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. CloudHSM as custom key store for AWS KMS Combines CloudHSM’s control with AWS KMS integrations • Use CloudHSM-backed keys in most AWS services via AWS KMS • One data protection pattern, multiple compliance levels
  • 42. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC CloudHSM cluster Customers’ applications via AWS SDKs AWS KMS standard key store AWS KMS KMS endpoint AWS KMS custom key store KMS HSM fleet 50+ AWS services AWS Cloud Custom key store “connector” Custom clients using PKCS#11, JCE, CNG
  • 43. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. KMS KMS BYOK (ImportKey) KMS CustomKeyStore (CloudHSM) Where keys are generated HSMs controlled by AWS HSMs controlled by you HSMs controlled by you Where keys are stored HSMs controlled by AWS HSMs controlled by AWS HSMs controlled by you Where keys are used HSMs controlled by AWS HSMs controlled by AWS HSMs controlled by you How to control key use JSON key policies you define JSON key policies you define JSON key policies you define Responsibility for performance/scale AWS AWS You Integration with AWS services? Yes Yes Yes Pricing model $1/key + usage $1/key + usage $1/key + usage; Hourly charge for each HSM Comparison of AWS KMS master key providers
  • 44. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 45. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Avni Rambhia arambhia@amazon.com Stephen Quigg squigg@amazon.com