Key Management System - A Journey on Cloud
Migration
December 2016
Rasananda Behera
Elite Panel Speaker & Industry Leader in Cloud Topology, Cyber Security
Silicon Valley – Cloud Expo
A Journey
DoDAF – Defense in Depth
DoDAF
ENCRYPTION DATA @ REST
Encryption Data at REST
Volume Encryption
Object Encryption
Database Encryption
EBS encryption OS Tools
AWS marketplace/
partnr
S3 server side
encryption[sse]
S3 SSE w/ customer
provided keys
Client side encryption
RDS ORACLE
TDE HSM
RDS MSSQL
TDE
RDS MYSQL
KMS
RDSPostgreSQL
KMS
Anazon Redshift
encryption
AWS KEY MANAGEMENT SERVICE
Introducing AWS Key Management Service
• A Service that enables you to provide and use encryption keys to protect your data
• Allows you to create, use, and manage encryption keys from within
• Your own applications via AWS SDK
• Supported AWS services
• S3
• EBS
• RDS
• Redshift
 Available in all commercial regions
WHAT IS SERVER SIDE ENCRYPTION
SERVER SIDE ENCRYPTION [S3]
SERVER-SIDE ENCRYPTION SSE [S3]
S3 WEBSERVER
KMS INFRASTRUCTURE
AWS KMS CONCEPTS
AWS SERVICES INTEGRATE WITH KMS
S3 SERVER-SIDE ENCRYPTION WITH KMS
RDS ENCRYPTION WITH KMS
REDSHIFT
KMS Provisioning…
KMS GIVES YOU CONTROL
Define who can
• Create a master key
• Use a master key
• Create and export a data key that is encrypted by a master key
• Enable / disable master keys
• Audit use of master key in AWS Cloud Trail
SECURE YOUR KEYS
KMS SECURES YOUR KEYS
• Plaintext keys are never stored in persistent memory on runtime systems
• Separation of duties
• AWS service team operators
– S3
– EBS
– RDS
cannot access KMS hosts that use master keys
 KMS operators cannot access service team hosts that use data keys
• Multi-party controls
• Normal operations requires signatures from two or more KMS operatorson any API calls
to an active host processing customer keys
• Verified claims in SOC1 and public white papers
HARDWARE SECURITY MODULE (HSM)
DATABASE ENCRYPTION
EBS
REDSHFT
CloudHSM
CloudHSM: Custom Software Applications
An architectural building block to help you secure your own applications
• Use standard libraries, with backend HSM rather than software based crypto
• PKCS#11
• JCA/JCE
• Micosoft CAP/CNG
• Code examples and details in the CloudHSM Getting Started Guide make it easier to get
started
aws.amazon.com/cloudhsm
ANALYSIS
KMS On-Premises Vs. CloudHSM Vs. AWS KMS
COMPARISON OF KEY MANAGEMENT
KMS UNIQUENESS
S3 OPTIMIOSATION
IDENTITY & ACCESS MANAGEMENT
IAM Policies
Fine grained
Administer as part of role based access
Apply policies to S3 at
1. Role
2. User
3. Group Level
Allow
Actions
PutObject
Resources
arn:aws:s3:::mybucket/*
Rasa Behera
POLICY
Rasa Behera My Bucket
GRANTS & Permissions
ACL
POLICY
Standards to Glacier
SSE S3 KMS
SSE – CUSTOMER PROVIDED KEYS
With SSE- C,
• Amazon S3 will encrypt the data at rest using the custom encryption keys
• Amazon S3 does NOT store your encryption key anywhere
• The key is discarded after Amazon S3completes your requests
BACK UP Slides
?
QUESTIONS
Please send directly to rasananda.behera@va.gov
BACK UP Slides
PART II:
MICROSOFT AZURE
KMS
RELATED SLIDES in OUR NEXT SESSION
Thank you

Presentation by R Behera on KMS aws

  • 1.
    Key Management System- A Journey on Cloud Migration December 2016 Rasananda Behera Elite Panel Speaker & Industry Leader in Cloud Topology, Cyber Security Silicon Valley – Cloud Expo
  • 2.
  • 3.
    DoDAF – Defensein Depth DoDAF
  • 4.
    ENCRYPTION DATA @REST Encryption Data at REST Volume Encryption Object Encryption Database Encryption EBS encryption OS Tools AWS marketplace/ partnr S3 server side encryption[sse] S3 SSE w/ customer provided keys Client side encryption RDS ORACLE TDE HSM RDS MSSQL TDE RDS MYSQL KMS RDSPostgreSQL KMS Anazon Redshift encryption
  • 5.
    AWS KEY MANAGEMENTSERVICE Introducing AWS Key Management Service • A Service that enables you to provide and use encryption keys to protect your data • Allows you to create, use, and manage encryption keys from within • Your own applications via AWS SDK • Supported AWS services • S3 • EBS • RDS • Redshift  Available in all commercial regions
  • 6.
    WHAT IS SERVERSIDE ENCRYPTION
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
    KMS Provisioning… KMS GIVESYOU CONTROL Define who can • Create a master key • Use a master key • Create and export a data key that is encrypted by a master key • Enable / disable master keys • Audit use of master key in AWS Cloud Trail
  • 17.
    SECURE YOUR KEYS KMSSECURES YOUR KEYS • Plaintext keys are never stored in persistent memory on runtime systems • Separation of duties • AWS service team operators – S3 – EBS – RDS cannot access KMS hosts that use master keys  KMS operators cannot access service team hosts that use data keys • Multi-party controls • Normal operations requires signatures from two or more KMS operatorson any API calls to an active host processing customer keys • Verified claims in SOC1 and public white papers
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
    CloudHSM CloudHSM: Custom SoftwareApplications An architectural building block to help you secure your own applications • Use standard libraries, with backend HSM rather than software based crypto • PKCS#11 • JCA/JCE • Micosoft CAP/CNG • Code examples and details in the CloudHSM Getting Started Guide make it easier to get started aws.amazon.com/cloudhsm
  • 24.
  • 25.
    KMS On-Premises Vs.CloudHSM Vs. AWS KMS COMPARISON OF KEY MANAGEMENT
  • 26.
  • 27.
  • 28.
    IDENTITY & ACCESSMANAGEMENT IAM Policies Fine grained Administer as part of role based access Apply policies to S3 at 1. Role 2. User 3. Group Level Allow Actions PutObject Resources arn:aws:s3:::mybucket/* Rasa Behera
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
    SSE – CUSTOMERPROVIDED KEYS With SSE- C, • Amazon S3 will encrypt the data at rest using the custom encryption keys • Amazon S3 does NOT store your encryption key anywhere • The key is discarded after Amazon S3completes your requests
  • 36.
    BACK UP Slides ? QUESTIONS Pleasesend directly to rasananda.behera@va.gov
  • 37.
    BACK UP Slides PARTII: MICROSOFT AZURE KMS RELATED SLIDES in OUR NEXT SESSION Thank you