SlideShare a Scribd company logo
©2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
CloudHSM Deep-Dive
Dave Walker – Specialised Solutions Architect Security/Compliance
Amazon Web Services UK Ltd
CloudHSM
• Tamper-Proof and Tamper-Evident
– Destroys its stored keys if under attack
• FIPS 140-2 Level 2 certified
• Base position is to be a Keystore
• Can also be used to timestamp documents
• You can send data for encrypt / decrypt
• Needs to be backed-up (ideally to HSM on customer premises)
• Can be (and should) be combined in HA clusters
• Is NOT a key management system
– but can work with some third-party ones
• Communicates via:
– PKCS#11
– JCE
• Some applications need a “plugin”
• Safenet have one for Apache
CloudHSM Integration with S3, EBS, EC2
• S3
– Integration using SafeNet KeySecure on EC2
– White paper at http://www2.safenet-inc.com/AWS-
guides/SafeNetKMIP_AmazonS3_IntegrationGuide.pdf
• EBS and EC2
– Use SafeNet KeySecure (6.1.2 or later) on EC2, backed by CloudHSM, for key
management
– Install SafeNet ProtectV Manager on EC2 (c1.medium / m1.medium)
– Install ProtectV Client on EC2 instances
– Use ProtectV for EBS volume encryption (ext3, ext4, swap)
– Supported platforms:
• RHEL 5.8, 6.2, 6.3
• CentOS 6.2
• Microsoft Windows 2008, 2012
– Encrypt full EBS-backed EC2 instances, including root volumes
AWS Databases and CloudHSM
• Redshift:
– When using CloudHSM
• Redshift gets cluster key from HSM
• Redshift generates a database key and encrypts it with the cluster key from the CloudHSM
• Redshift encrypts data with the database key
• Redshift supports re-encryption
• RDS
– RDS / Oracle EE can use CloudHSM to store keys as per Oracle Wallet
• So TDE can be HSM-backed
• Note that in-memory database contents (once the database has
been unlocked) are cleartext
– RAM encryption is not something AWS has today, but it has been done in other
contexts
– Homomorphic encryption
– Proof-of-concept with KVM
SafeNet Product Support for AWS
SafeNet Product AWS Service(s) Supported Notes
ProtectV and Virtual
KeySecure for AWS
EC2 or VPC Instances and EBS
Storage
GovCloud (Beta)
• Requires Safenet KeySecure (HW or Virtual)
• Available in AWS MarketPlace, as well as SafeNet sales channels
Virtual KeySecure for AWS CloudHSM • Available in AWS Marketplace
• CloudHSM supports Virtual KeySecure as the hardware root of trust
for vKS master keys
StorageSecure AWS Storage Gateway • Safenet KeySecure Hardware (optional)
• iSCSI integration (however StorageSecure also supports CIFS,
NFS, FTP, TFTP and HTTP protocols.)
Luna SA 7000 HSM CloudHSM
RedShift
RDS (via 3rd party vendor)
• High availability
• Key synchronization
• Key Management
Luna Backup HSM CloudHSM • Key backup
ProtectApp S3 and EBS volumes • Can be integrated with Amazon S3 Encryption Clients and AWS
SDKs (Java and .Net)
• Requires SafeNet KeySecure (HW or virtual)
• Can be installed on an EC2/VPC instance to protect data stored on
EBS volumes.
ProtectFile EBS volumes and S3 • Requires SafeNet KeySecure (HD or Virtual)
Difference between CloudHSM and
KMSCloudHSM
• Single-tenant HSM
• Customer-managed durability and
availability
• Customer managed root of trust
• FIPS 140-2 Validation
• Broad third-party app support
• Symmetric and asymmetric ops
• High fixed price ($16.5k/yr/hsm)
KMS
• Multi-tenant AWS service
• Highly available and durable key
storage and management
• AWS managed root of trust
• Extensive auditing
• Broad support for AWS services
• Symmetric encryption only
• Usage-based pricing
Why Customers Choose CloudHSM
• Reasons include:
– Control
• Complete control of encryption keys, AWS cannot access key material
• Fine-grained control of how AWS assets can use your keys
– Compliance
• FIPS 140-2 level 2 or 3 certification
• Common Criteria EAL4 certification
– Performance/Availability
• When required, “local” CloudHSM much better than on-prem
– Network transit times
– Usage patterns
Customer Control Over Keys
• Three reasons for this requirement
– Regulatory (hard), Policy (soft) and Trust (soft)
• Soft requirements may be addressed by threat
modelling
– KMS can be simpler and less expensive for customer to use
– Important to engage customer’s governance resources
• With CloudHSM, customers have absolute
control and authority over keys through
separation of duties
Separation of Duties
• Separation of duties is enforced by the HSM
appliance itself, using RBAC
Customer control keys
and crypto operations
CloudHSM
AWS manages the
appliance
Third-Party Compliance Validation
• Requirements
– PCI or other vertical-specific security standard
– Government workloads (US, Canada, and others)
– Enterprise policies increasingly require FIPS validation
• CloudHSM uses SafeNet Luna SA 7000
appliances
– FIPS 140-2 Level 2 Validated
– Common Criteria EAL4 Validated
Performance/Availability Advantages
• Customers may have existing on-prem HSMs
• Applications that require HSM access could
leverage on-prem HSMs over VPN or DX
• Latency and availability characteristics of VPN
or DX make CloudHSM desirable
Amazon Really Can’t Access Keys
• AWS has “appliance admin” to the HSM
• Luna SA separates appliance admin from “security officer”
• Customer initializes HSM themselves via SSH
• AWS never sees partition credentials
• Device is automatically wiped if unauthorised access
attempted
• Bottom line – you don’t have to trust AWS, you are trusting
the HSM vendor (SafeNet) and and third party FIPS/CC
validations
Operations
• Each HSM is dedicated to one customer
– No sharing or partitioning of the appliance
• Customer is responsible for operating the HSMs in HA mode
– SafeNet Client handles replication to multiple HSMs (up to 16)
– SafeNet Client load balances across available HSMs
• Password authentication controls access to the HSM
– PEDs (Pin Entry Devices) are not currently supported
• AWS monitors & manages the devices and network
infrastructure
• See FAQ and Technical docs for additional details
• Self-service provisioning and management now
supported through a public API
– CreateHSM and DeleteHSM to provision and terminate HSMs
– ModifyHSM permits changing the network configuration as well as
setting up syslog forwarding
• ListHSMs and DescribeHSM allow discovery and
querying of provisioned HSMs
• ListAvailableZones provides visibility into where
CloudHSM capacity is available
CloudHSM Public API and SDK
• Provisioning and de-provisioning
– Easy to provision an HSM, intialise it, clone keys from existing
HSMs
• Easier HSM management
– Lots of automation in the CLI to reduce management effort
• Simpler HA configuration
– Help you build and maintain HSM high availability (HA)
configurations
– From 9 manual steps, interacting with appliance shell directly
– To 2 simpler steps: create-hapg, add-hsm-to-hapg (for each HSM)
• Source code available via open source license
CloudHSM Command Line Interface (CLI) Tools
• Transparent data encryption support for RDS
Oracle databases
• Store master encryption keys in CloudHSM
instances
• High availability support for two or more HSMs
• Up to 20 separate databases per HSM
CloudHSM for RDS Oracle TDE
Auditing
• CloudTrail
– Track resource changes
– Audit activities for security and compliance purposes
– Review all CloudHSM API calls
• Syslog
– Audit operations on the HSM appliance
– Send syslog to customer-built and managed collector
CloudHSM Use Cases
EBS Volume Encryption
• Master key stored in CloudHSM
• SafeNet ProtectV & KeySecure
• Instances with ProtectV client
authenticate to KeySecure
• ProtectV client encrypts all I/O to
EBS volume (AES256)
Availability Zone
CloudHSM
Customer
Applications
SafeNet
KeySecure
SafeNet
ProtectV
Client
Redshift Encryption
• Cluster master key in CloudHSM
• Direct integration – no client software required
Your
applications
in Amazon
EC2
Amazon Redshift
Cluster
Your encrypted data
in Amazon Redshift
AWS CloudHSM
Database Encryption (non-RDS)
• Customer-managed
database in EC2
– Oracle 11g & 12c with
Transparent Data Encryption
(TDE)
– Microsoft SQL Server 2008 &
2012 with TDE
– Master key in CloudHSM
AWS
CloudHSM
Your database
with TDE in
Amazon EC2
Master key is created in
the HSM and never
leaves
Your applications
in Amazon EC2
Custom Software Applications
• Architectural building block to help you secure
your applications
• Use standard libraries, with back-end HSM
rather than software-based crypto
– PKCS#11, JCA/JCE, Microsoft CAPI/CNG/EKM
• Code examples and details in the CloudHSM
User Guide make it easier to get started
Other Use Cases
• Customer use cases continue to emerge:
– Enterprises using on-prem HSMs and want to move these workloads to the cloud
– Startups who want to offer high assurance services and achieve compliance
– Enterprises who are not using HSMs for some of their on-prem apps but who want
to use HSMs for these apps in the cloud
• Examples:
– Object encryption
– Digital Rights Management (DRM)
– Document signing, secure document management & secure document repository
– Payments, financial applications & transaction processing
– Privileged account management
– Certification authority (CA)
Using CloudHSM
Detailed Examples
• Building the CloudHSM Environment
• Configuring High Availability
• Integrating with RDS
Building a CloudHSM Environment
• Create customer
infrastructure using CF
template
• Install the CLI Tools
• Provision HSMs
• Initialise HSMs
Create Infrastructure with CF
Create Infrastructure with CF
Lookup your AZ identifiers on the EC2
Dashboard, and use those names
Install CLI Tools on Control Instance
• SSH to control instance deployed by CF Template
• Download and install the CloudHSM CLI Tools
# Install python 2.7
sudo yum install python27
wget https://bitbucket.org/pypa/setuptools/raw/bootstrap/ez_setup.py
sudo python2.7 ez_setup.py
# Download and install the CloudHSM CLI Tools
wget https://s3.amazonaws.com/cloudhsm-software/CloudHsmCLI.egg
sudo easy_install-2.7 -s /usr/local/bin CloudHsmCLI-beta.egg
cloudhsm version
{
"Version": ”<version>"
}
• Assign an IAM role to your instance to permit CloudHSM API access
Provision HSMs
• Create two HSMs (one for each subnet)
$ cloudhsm -c cloudhsm.conf create-hsm --ssh-public-key-file
cloudhsm_ssh.pub --iam-role-arn
arn:aws:iam::315160724404:role/CloudHSM-FRA-CloudHsmRole-
1ZEAT0Z2PB8P --subnet-id subnet-d244b0bb
{
"HsmArn": "arn:aws:cloudhsm:eu-central-1:315160724404:hsm-
f32462d6",
"RequestId": "e55c9da1-7b5b-11e4-9222-dd57de14ff9c"
}
Provision HSMs
• Describe status, wait until status changes from “PENDING” to “RUNNING”
$ cloudhsm -c cloudhsm.conf describe-hsm -H arn:aws:cloudhsm:eu-central-1:315160724404:hsm-
f32462d6
{
"EniId": "eni-047fbd6d",
"EniIp": "10.0.201.252",
"HsmArn": "arn:aws:cloudhsm:eu-central-1:315160724404:hsm-f32462d6",
"IamRoleArn": "arn:aws:iam::315160724404:role/CloudHSM-FRA-CloudHsmRole-1ZEAT0Z2PB8P",
"Partitions": [],
"RequestId": "2179b6f0-7b5c-11e4-a252-9d68fcf58947",
"SerialNumber": "472673",
"SoftwareVersion": "5.1.0-25",
"SshPublicKey": “…",
"Status": ”RUNNING",
"SubnetId": "subnet-d244b0bb",
"SubscriptionStartDate": "2014-12-04T02:18:56.292Z",
"SubscriptionType": "PRODUCTION",
"VendorName": "SafeNet Inc."
}
Provision HSMs
• Look for ENI “CloudHSM Managed Interface, DO
NOT DELETE!” in the description
Provisioning HSMs
• Change the ENI security group to the one with the
description “Allows SSH and NTLS from the
public subnet”
Initialize the HSM
$cloudhsm -c cloudhsm.conf initialize-hsm -H
arn:aws:cloudhsm:eu-central-1:315160724404:hsm-f32462d6 -
-label hsmLabel --cloning-domain cloningDomain --so-
password sopassword
{
"Status": "Initialization of the HSM successful"
}
Configure High Availability
• Create an HAPG (high availability partition group)
$ cloudhsm -c cloudhsm.conf create-hapg --group-label
Partition_001
Partition_001
{
"HapgArn": "arn:aws:cloudhsm:eu-central-1:315160724404:hapg-
8e3be050",
"RequestId": "ce3e1b17-7b64-11e4-a252-9d68fcf58947"
}
Configure High Availability
• Add the HSMs to the HAPG
cloudhsm -c cloudhsm.conf add-hsm-to-hapg -H
arn:aws:cloudhsm:eu-central-1:315160724404:hsm-f32462d6 --
hapg-arn arn:aws:cloudhsm:eu-central-1:315160724404:hapg-
8e3be050 --cloning-domain cloningDomain --partition-password
partitionPassword --so-password sopassword
{
"Status": "Addition of HSM arn:aws:cloudhsm:eu-central-
1:315160724404:hsm-f32462d6 to HAPG arn:aws:cloudhsm:eu-
central-1:315160724404:hapg-8e3be050 successful"
}
(then do it again for the second HSM)
Done!
• After this, you are ready to set up custom
software with SafeNet clients, RDS integration,
customer-managed databases, and more.
• Comprehensive documentation available at
http://aws.amazon.com/cloudhsm
CloudHSM Pricing and Trials
• HSM provisioned in any region has a $5,000
one-time charge, then metered hourly after that
• There is no “stop” only “terminate”
– We know this is challenging, since re-provisioning will incur
another $5,000 upfront charge
• 30-day trials are available for customers on
premium support
– Access these by opening a case with dev support
Conclusion
• HSMs, for basic key storage and bulk crypto,
are available in AWS, if you need them
• They’ll have better performance that on-prem
HSMs, owing to co-location
• CloudHSM (and HSMs in general) aren’t for
everyone
– Customers need trained staff, tight operational practice

More Related Content

What's hot

Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
Amazon Web Services
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
Amazon Web Services
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
Amazon Web Services
 
Introduction to CloudFront
Introduction to CloudFrontIntroduction to CloudFront
Introduction to CloudFront
Amazon Web Services
 
AWS Security & Compliance
AWS Security & ComplianceAWS Security & Compliance
AWS Security & Compliance
Amazon Web Services
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMS
Akesh Patil
 
AWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionAWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc Version
Ernest Chiang
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
Elastic  Load Balancing Deep Dive - AWS Online Tech TalkElastic  Load Balancing Deep Dive - AWS Online Tech Talk
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
Amazon Web Services
 
AWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | EdurekaAWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | Edureka
Edureka!
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Amazon Web Services
 
Deep Dive into Amazon ECS & Fargate
Deep Dive into Amazon ECS & FargateDeep Dive into Amazon ECS & Fargate
Deep Dive into Amazon ECS & Fargate
Amazon Web Services
 
Getting Started with Amazon EC2
Getting Started with Amazon EC2Getting Started with Amazon EC2
Getting Started with Amazon EC2
Amazon Web Services
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
Amazon Web Services
 
ABCs of AWS: S3
ABCs of AWS: S3ABCs of AWS: S3
ABCs of AWS: S3
Mark Cohen
 
Containers on AWS: An Introduction
Containers on AWS: An IntroductionContainers on AWS: An Introduction
Containers on AWS: An Introduction
Amazon Web Services
 
Introduction to AWS Storage Services
Introduction to AWS Storage ServicesIntroduction to AWS Storage Services
Introduction to AWS Storage Services
Amazon Web Services
 
Introducing AWS Fargate
Introducing AWS FargateIntroducing AWS Fargate
Introducing AWS Fargate
Amazon Web Services
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
Tom Laszewski
 

What's hot (20)

Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
 
Introduction to CloudFront
Introduction to CloudFrontIntroduction to CloudFront
Introduction to CloudFront
 
AWS Security & Compliance
AWS Security & ComplianceAWS Security & Compliance
AWS Security & Compliance
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMS
 
AWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionAWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc Version
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
Elastic  Load Balancing Deep Dive - AWS Online Tech TalkElastic  Load Balancing Deep Dive - AWS Online Tech Talk
Elastic Load Balancing Deep Dive - AWS Online Tech Talk
 
AWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | EdurekaAWS S3 Tutorial For Beginners | Edureka
AWS S3 Tutorial For Beginners | Edureka
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
 
Deep Dive into Amazon ECS & Fargate
Deep Dive into Amazon ECS & FargateDeep Dive into Amazon ECS & Fargate
Deep Dive into Amazon ECS & Fargate
 
Getting Started with Amazon EC2
Getting Started with Amazon EC2Getting Started with Amazon EC2
Getting Started with Amazon EC2
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
ABCs of AWS: S3
ABCs of AWS: S3ABCs of AWS: S3
ABCs of AWS: S3
 
Containers on AWS: An Introduction
Containers on AWS: An IntroductionContainers on AWS: An Introduction
Containers on AWS: An Introduction
 
Introduction to AWS Storage Services
Introduction to AWS Storage ServicesIntroduction to AWS Storage Services
Introduction to AWS Storage Services
 
Introducing AWS Fargate
Introducing AWS FargateIntroducing AWS Fargate
Introducing AWS Fargate
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 

Similar to Deep Dive: AWS CloudHSM (Classic)

AWS Summit Berlin 2013 - Keynote Steve Schmidt
AWS Summit Berlin 2013 - Keynote Steve SchmidtAWS Summit Berlin 2013 - Keynote Steve Schmidt
AWS Summit Berlin 2013 - Keynote Steve Schmidt
AWS Germany
 
LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM
Oleg Gryb
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
Presentation by R Behera on KMS aws
Presentation by R Behera on KMS  awsPresentation by R Behera on KMS  aws
Presentation by R Behera on KMS aws
Rasananda BEHERA
 
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAmazon Web Services
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Amazon Web Services
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
Amazon Web Services
 
Best Practices in Secure Cloud Migration
Best Practices in Secure Cloud MigrationBest Practices in Secure Cloud Migration
Best Practices in Secure Cloud Migration
CloudHesive
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAmazon Web Services
 
Crypto Options in AWS
Crypto Options in AWSCrypto Options in AWS
Crypto Options in AWS
Amazon Web Services
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
Amazon Web Services
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
Amazon Web Services
 
Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced Session
Amazon Web Services
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
Rolf Koski
 
AWS Cryptography Services – Addressing your data security and compliance need...
AWS Cryptography Services – Addressing your data security and compliance need...AWS Cryptography Services – Addressing your data security and compliance need...
AWS Cryptography Services – Addressing your data security and compliance need...
Amazon Web Services
 
Crypto-Options on AWS | Security Roadshow Dublin
Crypto-Options on AWS | Security Roadshow DublinCrypto-Options on AWS | Security Roadshow Dublin
Crypto-Options on AWS | Security Roadshow Dublin
Amazon Web Services
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
AWS Germany
 
Crypto Options in AWS
Crypto Options in AWSCrypto Options in AWS
Crypto Options in AWS
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 

Similar to Deep Dive: AWS CloudHSM (Classic) (20)

AWS Summit Berlin 2013 - Keynote Steve Schmidt
AWS Summit Berlin 2013 - Keynote Steve SchmidtAWS Summit Berlin 2013 - Keynote Steve Schmidt
AWS Summit Berlin 2013 - Keynote Steve Schmidt
 
LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Presentation by R Behera on KMS aws
Presentation by R Behera on KMS  awsPresentation by R Behera on KMS  aws
Presentation by R Behera on KMS aws
 
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security KeynoteAWS Summit Benelux 2013 - AWS Cloud Security Keynote
AWS Summit Benelux 2013 - AWS Cloud Security Keynote
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
Best Practices in Secure Cloud Migration
Best Practices in Secure Cloud MigrationBest Practices in Secure Cloud Migration
Best Practices in Secure Cloud Migration
 
AWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security KeynoteAWS Summit Nordics - Security Keynote
AWS Summit Nordics - Security Keynote
 
Crypto Options in AWS
Crypto Options in AWSCrypto Options in AWS
Crypto Options in AWS
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
 
Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced Session
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
AWS Cryptography Services – Addressing your data security and compliance need...
AWS Cryptography Services – Addressing your data security and compliance need...AWS Cryptography Services – Addressing your data security and compliance need...
AWS Cryptography Services – Addressing your data security and compliance need...
 
Crypto-Options on AWS | Security Roadshow Dublin
Crypto-Options on AWS | Security Roadshow DublinCrypto-Options on AWS | Security Roadshow Dublin
Crypto-Options on AWS | Security Roadshow Dublin
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
Crypto Options in AWS
Crypto Options in AWSCrypto Options in AWS
Crypto Options in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Deep Dive: AWS CloudHSM (Classic)

  • 1. ©2015, Amazon Web Services, Inc. or its affiliates. All rights reserved CloudHSM Deep-Dive Dave Walker – Specialised Solutions Architect Security/Compliance Amazon Web Services UK Ltd
  • 2. CloudHSM • Tamper-Proof and Tamper-Evident – Destroys its stored keys if under attack • FIPS 140-2 Level 2 certified • Base position is to be a Keystore • Can also be used to timestamp documents • You can send data for encrypt / decrypt • Needs to be backed-up (ideally to HSM on customer premises) • Can be (and should) be combined in HA clusters • Is NOT a key management system – but can work with some third-party ones • Communicates via: – PKCS#11 – JCE • Some applications need a “plugin” • Safenet have one for Apache
  • 3. CloudHSM Integration with S3, EBS, EC2 • S3 – Integration using SafeNet KeySecure on EC2 – White paper at http://www2.safenet-inc.com/AWS- guides/SafeNetKMIP_AmazonS3_IntegrationGuide.pdf • EBS and EC2 – Use SafeNet KeySecure (6.1.2 or later) on EC2, backed by CloudHSM, for key management – Install SafeNet ProtectV Manager on EC2 (c1.medium / m1.medium) – Install ProtectV Client on EC2 instances – Use ProtectV for EBS volume encryption (ext3, ext4, swap) – Supported platforms: • RHEL 5.8, 6.2, 6.3 • CentOS 6.2 • Microsoft Windows 2008, 2012 – Encrypt full EBS-backed EC2 instances, including root volumes
  • 4. AWS Databases and CloudHSM • Redshift: – When using CloudHSM • Redshift gets cluster key from HSM • Redshift generates a database key and encrypts it with the cluster key from the CloudHSM • Redshift encrypts data with the database key • Redshift supports re-encryption • RDS – RDS / Oracle EE can use CloudHSM to store keys as per Oracle Wallet • So TDE can be HSM-backed • Note that in-memory database contents (once the database has been unlocked) are cleartext – RAM encryption is not something AWS has today, but it has been done in other contexts – Homomorphic encryption – Proof-of-concept with KVM
  • 5. SafeNet Product Support for AWS SafeNet Product AWS Service(s) Supported Notes ProtectV and Virtual KeySecure for AWS EC2 or VPC Instances and EBS Storage GovCloud (Beta) • Requires Safenet KeySecure (HW or Virtual) • Available in AWS MarketPlace, as well as SafeNet sales channels Virtual KeySecure for AWS CloudHSM • Available in AWS Marketplace • CloudHSM supports Virtual KeySecure as the hardware root of trust for vKS master keys StorageSecure AWS Storage Gateway • Safenet KeySecure Hardware (optional) • iSCSI integration (however StorageSecure also supports CIFS, NFS, FTP, TFTP and HTTP protocols.) Luna SA 7000 HSM CloudHSM RedShift RDS (via 3rd party vendor) • High availability • Key synchronization • Key Management Luna Backup HSM CloudHSM • Key backup ProtectApp S3 and EBS volumes • Can be integrated with Amazon S3 Encryption Clients and AWS SDKs (Java and .Net) • Requires SafeNet KeySecure (HW or virtual) • Can be installed on an EC2/VPC instance to protect data stored on EBS volumes. ProtectFile EBS volumes and S3 • Requires SafeNet KeySecure (HD or Virtual)
  • 6. Difference between CloudHSM and KMSCloudHSM • Single-tenant HSM • Customer-managed durability and availability • Customer managed root of trust • FIPS 140-2 Validation • Broad third-party app support • Symmetric and asymmetric ops • High fixed price ($16.5k/yr/hsm) KMS • Multi-tenant AWS service • Highly available and durable key storage and management • AWS managed root of trust • Extensive auditing • Broad support for AWS services • Symmetric encryption only • Usage-based pricing
  • 7. Why Customers Choose CloudHSM • Reasons include: – Control • Complete control of encryption keys, AWS cannot access key material • Fine-grained control of how AWS assets can use your keys – Compliance • FIPS 140-2 level 2 or 3 certification • Common Criteria EAL4 certification – Performance/Availability • When required, “local” CloudHSM much better than on-prem – Network transit times – Usage patterns
  • 8. Customer Control Over Keys • Three reasons for this requirement – Regulatory (hard), Policy (soft) and Trust (soft) • Soft requirements may be addressed by threat modelling – KMS can be simpler and less expensive for customer to use – Important to engage customer’s governance resources • With CloudHSM, customers have absolute control and authority over keys through separation of duties
  • 9. Separation of Duties • Separation of duties is enforced by the HSM appliance itself, using RBAC Customer control keys and crypto operations CloudHSM AWS manages the appliance
  • 10. Third-Party Compliance Validation • Requirements – PCI or other vertical-specific security standard – Government workloads (US, Canada, and others) – Enterprise policies increasingly require FIPS validation • CloudHSM uses SafeNet Luna SA 7000 appliances – FIPS 140-2 Level 2 Validated – Common Criteria EAL4 Validated
  • 11. Performance/Availability Advantages • Customers may have existing on-prem HSMs • Applications that require HSM access could leverage on-prem HSMs over VPN or DX • Latency and availability characteristics of VPN or DX make CloudHSM desirable
  • 12. Amazon Really Can’t Access Keys • AWS has “appliance admin” to the HSM • Luna SA separates appliance admin from “security officer” • Customer initializes HSM themselves via SSH • AWS never sees partition credentials • Device is automatically wiped if unauthorised access attempted • Bottom line – you don’t have to trust AWS, you are trusting the HSM vendor (SafeNet) and and third party FIPS/CC validations
  • 13. Operations • Each HSM is dedicated to one customer – No sharing or partitioning of the appliance • Customer is responsible for operating the HSMs in HA mode – SafeNet Client handles replication to multiple HSMs (up to 16) – SafeNet Client load balances across available HSMs • Password authentication controls access to the HSM – PEDs (Pin Entry Devices) are not currently supported • AWS monitors & manages the devices and network infrastructure • See FAQ and Technical docs for additional details
  • 14. • Self-service provisioning and management now supported through a public API – CreateHSM and DeleteHSM to provision and terminate HSMs – ModifyHSM permits changing the network configuration as well as setting up syslog forwarding • ListHSMs and DescribeHSM allow discovery and querying of provisioned HSMs • ListAvailableZones provides visibility into where CloudHSM capacity is available CloudHSM Public API and SDK
  • 15. • Provisioning and de-provisioning – Easy to provision an HSM, intialise it, clone keys from existing HSMs • Easier HSM management – Lots of automation in the CLI to reduce management effort • Simpler HA configuration – Help you build and maintain HSM high availability (HA) configurations – From 9 manual steps, interacting with appliance shell directly – To 2 simpler steps: create-hapg, add-hsm-to-hapg (for each HSM) • Source code available via open source license CloudHSM Command Line Interface (CLI) Tools
  • 16. • Transparent data encryption support for RDS Oracle databases • Store master encryption keys in CloudHSM instances • High availability support for two or more HSMs • Up to 20 separate databases per HSM CloudHSM for RDS Oracle TDE
  • 17. Auditing • CloudTrail – Track resource changes – Audit activities for security and compliance purposes – Review all CloudHSM API calls • Syslog – Audit operations on the HSM appliance – Send syslog to customer-built and managed collector
  • 19. EBS Volume Encryption • Master key stored in CloudHSM • SafeNet ProtectV & KeySecure • Instances with ProtectV client authenticate to KeySecure • ProtectV client encrypts all I/O to EBS volume (AES256) Availability Zone CloudHSM Customer Applications SafeNet KeySecure SafeNet ProtectV Client
  • 20. Redshift Encryption • Cluster master key in CloudHSM • Direct integration – no client software required Your applications in Amazon EC2 Amazon Redshift Cluster Your encrypted data in Amazon Redshift AWS CloudHSM
  • 21. Database Encryption (non-RDS) • Customer-managed database in EC2 – Oracle 11g & 12c with Transparent Data Encryption (TDE) – Microsoft SQL Server 2008 & 2012 with TDE – Master key in CloudHSM AWS CloudHSM Your database with TDE in Amazon EC2 Master key is created in the HSM and never leaves Your applications in Amazon EC2
  • 22. Custom Software Applications • Architectural building block to help you secure your applications • Use standard libraries, with back-end HSM rather than software-based crypto – PKCS#11, JCA/JCE, Microsoft CAPI/CNG/EKM • Code examples and details in the CloudHSM User Guide make it easier to get started
  • 23. Other Use Cases • Customer use cases continue to emerge: – Enterprises using on-prem HSMs and want to move these workloads to the cloud – Startups who want to offer high assurance services and achieve compliance – Enterprises who are not using HSMs for some of their on-prem apps but who want to use HSMs for these apps in the cloud • Examples: – Object encryption – Digital Rights Management (DRM) – Document signing, secure document management & secure document repository – Payments, financial applications & transaction processing – Privileged account management – Certification authority (CA)
  • 25. Detailed Examples • Building the CloudHSM Environment • Configuring High Availability • Integrating with RDS
  • 26. Building a CloudHSM Environment • Create customer infrastructure using CF template • Install the CLI Tools • Provision HSMs • Initialise HSMs
  • 28. Create Infrastructure with CF Lookup your AZ identifiers on the EC2 Dashboard, and use those names
  • 29. Install CLI Tools on Control Instance • SSH to control instance deployed by CF Template • Download and install the CloudHSM CLI Tools # Install python 2.7 sudo yum install python27 wget https://bitbucket.org/pypa/setuptools/raw/bootstrap/ez_setup.py sudo python2.7 ez_setup.py # Download and install the CloudHSM CLI Tools wget https://s3.amazonaws.com/cloudhsm-software/CloudHsmCLI.egg sudo easy_install-2.7 -s /usr/local/bin CloudHsmCLI-beta.egg cloudhsm version { "Version": ”<version>" } • Assign an IAM role to your instance to permit CloudHSM API access
  • 30. Provision HSMs • Create two HSMs (one for each subnet) $ cloudhsm -c cloudhsm.conf create-hsm --ssh-public-key-file cloudhsm_ssh.pub --iam-role-arn arn:aws:iam::315160724404:role/CloudHSM-FRA-CloudHsmRole- 1ZEAT0Z2PB8P --subnet-id subnet-d244b0bb { "HsmArn": "arn:aws:cloudhsm:eu-central-1:315160724404:hsm- f32462d6", "RequestId": "e55c9da1-7b5b-11e4-9222-dd57de14ff9c" }
  • 31. Provision HSMs • Describe status, wait until status changes from “PENDING” to “RUNNING” $ cloudhsm -c cloudhsm.conf describe-hsm -H arn:aws:cloudhsm:eu-central-1:315160724404:hsm- f32462d6 { "EniId": "eni-047fbd6d", "EniIp": "10.0.201.252", "HsmArn": "arn:aws:cloudhsm:eu-central-1:315160724404:hsm-f32462d6", "IamRoleArn": "arn:aws:iam::315160724404:role/CloudHSM-FRA-CloudHsmRole-1ZEAT0Z2PB8P", "Partitions": [], "RequestId": "2179b6f0-7b5c-11e4-a252-9d68fcf58947", "SerialNumber": "472673", "SoftwareVersion": "5.1.0-25", "SshPublicKey": “…", "Status": ”RUNNING", "SubnetId": "subnet-d244b0bb", "SubscriptionStartDate": "2014-12-04T02:18:56.292Z", "SubscriptionType": "PRODUCTION", "VendorName": "SafeNet Inc." }
  • 32. Provision HSMs • Look for ENI “CloudHSM Managed Interface, DO NOT DELETE!” in the description
  • 33. Provisioning HSMs • Change the ENI security group to the one with the description “Allows SSH and NTLS from the public subnet”
  • 34. Initialize the HSM $cloudhsm -c cloudhsm.conf initialize-hsm -H arn:aws:cloudhsm:eu-central-1:315160724404:hsm-f32462d6 - -label hsmLabel --cloning-domain cloningDomain --so- password sopassword { "Status": "Initialization of the HSM successful" }
  • 35. Configure High Availability • Create an HAPG (high availability partition group) $ cloudhsm -c cloudhsm.conf create-hapg --group-label Partition_001 Partition_001 { "HapgArn": "arn:aws:cloudhsm:eu-central-1:315160724404:hapg- 8e3be050", "RequestId": "ce3e1b17-7b64-11e4-a252-9d68fcf58947" }
  • 36. Configure High Availability • Add the HSMs to the HAPG cloudhsm -c cloudhsm.conf add-hsm-to-hapg -H arn:aws:cloudhsm:eu-central-1:315160724404:hsm-f32462d6 -- hapg-arn arn:aws:cloudhsm:eu-central-1:315160724404:hapg- 8e3be050 --cloning-domain cloningDomain --partition-password partitionPassword --so-password sopassword { "Status": "Addition of HSM arn:aws:cloudhsm:eu-central- 1:315160724404:hsm-f32462d6 to HAPG arn:aws:cloudhsm:eu- central-1:315160724404:hapg-8e3be050 successful" } (then do it again for the second HSM)
  • 37. Done! • After this, you are ready to set up custom software with SafeNet clients, RDS integration, customer-managed databases, and more. • Comprehensive documentation available at http://aws.amazon.com/cloudhsm
  • 38. CloudHSM Pricing and Trials • HSM provisioned in any region has a $5,000 one-time charge, then metered hourly after that • There is no “stop” only “terminate” – We know this is challenging, since re-provisioning will incur another $5,000 upfront charge • 30-day trials are available for customers on premium support – Access these by opening a case with dev support
  • 39. Conclusion • HSMs, for basic key storage and bulk crypto, are available in AWS, if you need them • They’ll have better performance that on-prem HSMs, owing to co-location • CloudHSM (and HSMs in general) aren’t for everyone – Customers need trained staff, tight operational practice