SlideShare a Scribd company logo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Avni Rambhia, AWS Cryptography
October 2017
AWS CloudHSM
Secure and keep control of your own
encryption keys in the AWS Cloud
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Key Management Service
Using Keys Securely in AWS
AWS CloudHSM
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What CloudHSM Provides
Protect your
encryption keys with
secure and compliant
hardware security
modules.
Keep total control of
access management
to your encryption
keys.
• AWS has no access to your
HSM or to the keys inside.
• All communication with your
HSM is encrypted end-to-end.
• Single tenant access to FIPS
140-2 Level 3 validated
hardware.
• Supports security-sensitive
workloads subject to compliance
regulations.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Second-Generation CloudHSM
• Fully managed HSMs in the AWS cloud
Launched August 2017
Focus of today’s webinar
• CloudHSM Classic: First Generation Service
SafeNet HSMs in AWS cloud
Available to existing CloudHSM Classic customers only
FAQ at https://aws.amazon.com/cloudhsm/faqs-classic/
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Why Customers Use AWS CloudHSM
• Offload TLS/SSL processing
• Certificate authority (CA)
• Transparent Data Encryption (TDE) for Oracle databases
• Document and code signing
• Digital Rights Management
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Online Certificate Authority
• Integrate using PKCS#11, JCE and CNG (for
Microsoft ActiveDirectory)
• Create & store private keys safely and under
your control on HSM
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Database Encryption with CloudHSM
Cluster
Cryptographic
Officer
Database Users
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
SSL/TLS Offload
• Integrate via OpenSSL
• Create/store private keys on HSM
• Cryptographic acceleration
• Expand/shrink cluster on demand
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Capabilities and Performance
Each HSM offers:
• ~1000 RSA sign/verify operations per second
• AES at network speed
• ~3,500 key storage capacity
Scale up to 32 HSMs per cluster
• ~32,000 RSA sign/verify operations in one cluster in one VPC
Scale down to zero; restore from backup
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of Using
Hardware Security Modules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Total Control of Access Management
• Secure HSM access to create users and policies.
• Granular access management policies for up to 1,024
users on your HSMs.
• User-created keys not visible to other users.
• Keys can be shared with up to 8 other users who can
use (but not manage) that specific key.
• AWS has no access to your encryption keys.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Scalable and Easy to Manage
• Fully managed HSMs in the cloud.
• Smart, load balancing clusters with automatic failover
• Automated high-availability
• Scale up and down clusters with a single API call
• Pay as you go with no upfront costs.
• Flexibly scale up and down as workload fluctuates
• Automated, secure backups.
• Can only be restored to AWS CloudHSM hardware
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Monitoring and Logging
• CloudWatch Metrics
• Cluster Health
• HSM health
• Memory Utilization
• Session count
• Create Custom Alarms and Thresholds
• Enables “Autoscale”
• CloudTrail Logs
• API call history
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Zero-Config High Availability with
AWS CloudHSM
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Concept of a Cluster
• All HSMs are part of a cluster
• Group of equivalent HSMs
• Between 0-32 HSMs per Cluster
• Users, policies and keys are identical
• Clients automatically load-balance across the cluster
• Cross-AZ for high availability
• Within a single region
• Cross-region replication not supported today
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Four Steps to Activated HSM
Step 1: Create a Cluster
Sets up environment for HSM instance
Step 2: Create & Verify HSM
Ensure your HSM is authentic HSM in AWS cloud
Step 3: Initialize the Cluster
Sign the cluster certificate with your credentials, making it ‘yours’
Step 4: Activate the Cluster
Login to HSM, change default password, and proceed to use as CO
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Activated Cluster: One-click Expand/Contract
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CloudHSM Clustering
CloudHSM Instance
CloudHSM Instance
Active/Active Sync
CloudHSM Cluster
Customer VPC
Zero Config
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Clustering – Expanding the Cluster
CloudHSM Instance
CloudHSM Instance
Active/Active Sync
CloudHSM Cluster
Customer VPC
Backup
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Clustering
CloudHSM Cluster
Customer VPC
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Clustering
CloudHSM Cluster
Customer VPC
Restore
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Clustering
CloudHSM Cluster
Customer VPC
Push New Config
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Clustering
CloudHSM Cluster
Customer VPC
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
High Availability Best Practices
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Wrap-Up
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits to the Customer
What’s New CloudHSM Features
Pay as you go Pricing based on use; no upfront costs
More scalable
Start and stop HSMs on demand
Spin cluster down to zero HSMs, restore from backup when needed
Improved security
FIPS 140-2 Level 3 validated
MofN & 2FA supported
Fully managed Provisioning, patching, back-up, and HA included
Built on open standards
Export, as permitted, keys to most commercially available HSMs
PKCS#11 and JCE SDKs; CNG coming shortly
Easier to use Point and click console
Automated HA
New HSMs automatically cloned;
clients automatically reconfigured
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Pricing and Availability
Region Region
US East (N. Virginia) Asia Pacific (Mumbai)
US East (Ohio) Asia Pacific (Singapore)
US West (Oregon) Asia Pacific (Sydney)
US West (N. California) Asia Pacific (Tokyo)
Canada (Central) EU (Ireland)
EU (Frankfurt)
• No upfront costs to use AWS CloudHSM.
• Per-HSM hourly fee varies by region; lower than CloudHSM Classic.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Questions?
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...
Amazon Web Services
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
Amazon Web Services
 
Amazon S3 Masterclass
Amazon S3 MasterclassAmazon S3 Masterclass
Amazon S3 Masterclass
Amazon Web Services
 
Aws IAM
Aws IAMAws IAM
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
Amazon Web Services
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
Amazon Web Services
 
Intro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesIntro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute Services
Amazon Web Services
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
Amazon Web Services
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
 
AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
Jason Poley
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
Amazon Web Services
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
Amazon Web Services
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
Amazon Web Services
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
Amazon Web Services
 
AWS VPC & Networking basic concepts
AWS VPC & Networking basic conceptsAWS VPC & Networking basic concepts
AWS VPC & Networking basic concepts
Abhinav Kumar
 
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
Amazon Web Services
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
Moshe Ferber
 

What's hot (20)

Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...Performing a Security Assessment of the Cloud using the Risk Management Frame...
Performing a Security Assessment of the Cloud using the Risk Management Frame...
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Amazon S3 Masterclass
Amazon S3 MasterclassAmazon S3 Masterclass
Amazon S3 Masterclass
 
Aws IAM
Aws IAMAws IAM
Aws IAM
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Intro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute ServicesIntro to AWS: EC2 & Compute Services
Intro to AWS: EC2 & Compute Services
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
AWS Monitoring & Logging
AWS Monitoring & LoggingAWS Monitoring & Logging
AWS Monitoring & Logging
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
IAM Introduction
IAM IntroductionIAM Introduction
IAM Introduction
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
AWS VPC & Networking basic concepts
AWS VPC & Networking basic conceptsAWS VPC & Networking basic concepts
AWS VPC & Networking basic concepts
 
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
AWS re:Invent 2016: From Monolithic to Microservices: Evolving Architecture P...
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 

Similar to CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks

Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Amazon Web Services
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Amazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
Amazon Web Services
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
Amazon Web Services
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
Amazon Web Services
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
Amazon Web Services
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
Amazon Web Services
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
Bela Sojina MBA, PMP
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
Amazon Web Services
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
Amazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
Amazon Web Services
 
Understanding AWS Secrets Manager - AWS Online Tech Talks
Understanding AWS Secrets Manager - AWS Online Tech TalksUnderstanding AWS Secrets Manager - AWS Online Tech Talks
Understanding AWS Secrets Manager - AWS Online Tech Talks
Amazon Web Services
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
Amazon Web Services
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and Remediation
Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
Amazon Web Services
 
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side EncryptionSID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
Amazon Web Services
 

Similar to CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks (20)

Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Understanding AWS Secrets Manager - AWS Online Tech Talks
Understanding AWS Secrets Manager - AWS Online Tech TalksUnderstanding AWS Secrets Manager - AWS Online Tech Talks
Understanding AWS Secrets Manager - AWS Online Tech Talks
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and Remediation
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side EncryptionSID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
SID345-AWS Encryption SDK The Busy Engineer’s Guide to Client-Side Encryption
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Avni Rambhia, AWS Cryptography October 2017 AWS CloudHSM Secure and keep control of your own encryption keys in the AWS Cloud
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Key Management Service Using Keys Securely in AWS AWS CloudHSM
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What CloudHSM Provides Protect your encryption keys with secure and compliant hardware security modules. Keep total control of access management to your encryption keys. • AWS has no access to your HSM or to the keys inside. • All communication with your HSM is encrypted end-to-end. • Single tenant access to FIPS 140-2 Level 3 validated hardware. • Supports security-sensitive workloads subject to compliance regulations.
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Second-Generation CloudHSM • Fully managed HSMs in the AWS cloud Launched August 2017 Focus of today’s webinar • CloudHSM Classic: First Generation Service SafeNet HSMs in AWS cloud Available to existing CloudHSM Classic customers only FAQ at https://aws.amazon.com/cloudhsm/faqs-classic/
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Why Customers Use AWS CloudHSM • Offload TLS/SSL processing • Certificate authority (CA) • Transparent Data Encryption (TDE) for Oracle databases • Document and code signing • Digital Rights Management
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Online Certificate Authority • Integrate using PKCS#11, JCE and CNG (for Microsoft ActiveDirectory) • Create & store private keys safely and under your control on HSM
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Database Encryption with CloudHSM Cluster Cryptographic Officer Database Users
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. SSL/TLS Offload • Integrate via OpenSSL • Create/store private keys on HSM • Cryptographic acceleration • Expand/shrink cluster on demand
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Capabilities and Performance Each HSM offers: • ~1000 RSA sign/verify operations per second • AES at network speed • ~3,500 key storage capacity Scale up to 32 HSMs per cluster • ~32,000 RSA sign/verify operations in one cluster in one VPC Scale down to zero; restore from backup
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of Using Hardware Security Modules
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Total Control of Access Management • Secure HSM access to create users and policies. • Granular access management policies for up to 1,024 users on your HSMs. • User-created keys not visible to other users. • Keys can be shared with up to 8 other users who can use (but not manage) that specific key. • AWS has no access to your encryption keys.
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Scalable and Easy to Manage • Fully managed HSMs in the cloud. • Smart, load balancing clusters with automatic failover • Automated high-availability • Scale up and down clusters with a single API call • Pay as you go with no upfront costs. • Flexibly scale up and down as workload fluctuates • Automated, secure backups. • Can only be restored to AWS CloudHSM hardware
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Monitoring and Logging • CloudWatch Metrics • Cluster Health • HSM health • Memory Utilization • Session count • Create Custom Alarms and Thresholds • Enables “Autoscale” • CloudTrail Logs • API call history
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Zero-Config High Availability with AWS CloudHSM
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Concept of a Cluster • All HSMs are part of a cluster • Group of equivalent HSMs • Between 0-32 HSMs per Cluster • Users, policies and keys are identical • Clients automatically load-balance across the cluster • Cross-AZ for high availability • Within a single region • Cross-region replication not supported today
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Four Steps to Activated HSM Step 1: Create a Cluster Sets up environment for HSM instance Step 2: Create & Verify HSM Ensure your HSM is authentic HSM in AWS cloud Step 3: Initialize the Cluster Sign the cluster certificate with your credentials, making it ‘yours’ Step 4: Activate the Cluster Login to HSM, change default password, and proceed to use as CO
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Activated Cluster: One-click Expand/Contract
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CloudHSM Clustering CloudHSM Instance CloudHSM Instance Active/Active Sync CloudHSM Cluster Customer VPC Zero Config
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Clustering – Expanding the Cluster CloudHSM Instance CloudHSM Instance Active/Active Sync CloudHSM Cluster Customer VPC Backup
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Clustering CloudHSM Cluster Customer VPC
  • 21. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Clustering CloudHSM Cluster Customer VPC Restore
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Clustering CloudHSM Cluster Customer VPC Push New Config
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Clustering CloudHSM Cluster Customer VPC
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. High Availability Best Practices
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Wrap-Up
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits to the Customer What’s New CloudHSM Features Pay as you go Pricing based on use; no upfront costs More scalable Start and stop HSMs on demand Spin cluster down to zero HSMs, restore from backup when needed Improved security FIPS 140-2 Level 3 validated MofN & 2FA supported Fully managed Provisioning, patching, back-up, and HA included Built on open standards Export, as permitted, keys to most commercially available HSMs PKCS#11 and JCE SDKs; CNG coming shortly Easier to use Point and click console Automated HA New HSMs automatically cloned; clients automatically reconfigured
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Pricing and Availability Region Region US East (N. Virginia) Asia Pacific (Mumbai) US East (Ohio) Asia Pacific (Singapore) US West (Oregon) Asia Pacific (Sydney) US West (N. California) Asia Pacific (Tokyo) Canada (Central) EU (Ireland) EU (Frankfurt) • No upfront costs to use AWS CloudHSM. • Per-HSM hourly fee varies by region; lower than CloudHSM Classic.
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Questions?
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!