SlideShare a Scribd company logo
1 of 33
AWS KMS
Agenda
• Service Introduction
• Service Enablement
• Design Patterns
• Access Management
• Best Practices
2
Akesh Patil
Sr. Cloud Architect
Digital & Cloud Consulting
AWS Community Builder | AWS APN
Ambassador
Speaker
AWS KMS
4
AWS Key Management Service (AWS KMS) lets you create, manage, and control
cryptographic keys across your applications and AWS services.
What is AWS KMS?
• Multi-Tenant, Managed service that makes it easy for you to create and control the
encryption keys used to encrypt your data.
• AWS KMS uses Hardware Security Modules (HSMs) to protect the security of your
keys.
• Scales to any workload with low latency and 99.999% public SLA
• AWS KMS can be used to protect your data in AWS service and in your applications
5
How it works
6
KMS Key Hierarchy
• Within AWS KMS, key hierarchy starts with a Customer Master Key (CMK)
• CMK can be used directly to encrypt data blocks up to 4KB or it can be used to
secure data keys
• CMKs are broken down into two general types AWS-managed & Customer-
managed
• AWS KMS is integrated with over 100+ AWS services including all major
databases, analytics, storage and workflow and productivity tools
• Logging and monitoring provided by Amazon CloudWatch & CloudTrail
AWS Managed Keys, Customer Managed Keys & AWS Owner Keys
Customer Managed Key AWS Managed Key AWS Owned Key
Policy Customer AWS AWS
Audit Customer CloudTrail Customer CloudTrail None
Rotation Customer AWS Fixed @ 3 Years
Copy to other
regions?
Yes (For MRK keys) No Yes (Limited)
Cost $1 per month Charges on API calls No cost on key or API
calls
Levels of Data Encryption
Data Encryption with Symmetric AWS KMS
Copy Rights Blazeclan Technologies Pvt. Ltd. 9
Create a data key
1
Encrypt data with
data key
2
Decrypt data with
data key
3
Create a data key
Generate data key
with AWS KMS
KMS returns plaintext
and encrypted copy
of data key
Encrypt data with a data key
Encrypt data outside of AWS KMS
Use plaintext data key to encrypt
the data
Remove the plaintext data key
from memory as soon as possible.
Decrypt data with data key
Decrypt data keys using AWS KMS
Use the plaintext data key to
decrypt your data
Remove the plaintext data key
from memory as soon as possible.
Amazon EBS Encryption with EC2
Create encrypted EBS
volume with KMS key
Amazon EBS asks KMS
to generate encrypted
data key
Amazon EBS stores
the encrypted data
key with the volume.
Attach the EBS
volume to an EC2
instance
EC2 uses KMS key to
decrypt the EBS
volume's encrypted
data key.
EC2 stores the
plaintext data key in
hypervisor memory
EC2 uses plaintext
data key to encrypt
disk I/O to the EBS
volume
Data key persists in
the memory as long
as long EBS volume is
attached to instance
How unusable KMS keys affect data keys?
KMS keys can become unusable for a variety of reasons
• Disabling KMS Key
• Scheduling KMS Key deletion
• Deleting the key material
• Disconnecting the AWS CloudHSM key store
• Disconnecting the external key store
Impact of unusable KMS key on EBS encryption
Create encrypted
EBS volume with
KMS key
Amazon EBS asks
KMS to generate
encrypted data key
Amazon EBS stores
the encrypted data
key with the volume.
Attach the EBS
volume to an EC2
instance
EC2 uses KMS key to
decrypt the EBS
volume's encrypted
data key.
EC2 stores the
plaintext data key in
hypervisor memory
Perform an action
that makes the KMS
key unusable
Encrypted EBS
volume is detached
from the EC2
instance
Amazon EBS removes
the plaintext key
from memory
Encrypted EBS
volume is attached
to another EC2
instance
Amazon EBS cannot
use the KMS key to
decrypt the volume's
encrypted data key
Attachment fails
Data Encryption with Asymmetric AWS KMS
Copy Rights Blazeclan Technologies Pvt. Ltd. 16
Create a data key
pair
1
Encrypt data with a
data key pair
2
Decrypt data with a
data key pair
3
Create a data key pair
Generate data key pair with
AWS KMS
KMS returns plaintext public
key, plaintext and encrypted
copy of private key
Encrypt data with a data key pair
Encrypt data
outside of AWS
KMS
Use plaintext
public key to
encrypt the data
Decrypt data with a data key pair
Decrypt private keys using AWS
KMS
Use the plaintext private key to
decrypt your data
Remove the plaintext private key
from memory as soon as possible.
AWS KMS : Design Patterns
Centralized model
Key Management account
Key Policy Data encryption
key
Key Policy Data encryption
key
Customer Managed
Key
Aliases
Key Policy Data encryption
key
Key Policy Data encryption
key
Customer Managed
Key
Aliases
prod-
ebs
prod-rds
nonprod
-ebs
nonprod
-rds
AWS KMS
Production account Non-Production account
KMS Usage Role KMS Usage Role
Decentralized model
AWS Account 11111111111
KMS Admin
Role
KMS Keys
KMS Admin
Role
Admin 1
User 1
Assume Role
Assume Role
AWS Account 11111111111
KMS Admin
Role
KMS Keys
AWS KMS
KMS Admin
Role
Admin 1
User 1
Assume Role
Assume Role
How many keys I will need?
Depends on the goals and security policies (e.g. is there preference for
centralized or distributed?)
Typically isolated by service (different keys for S3, Lambda, EKS, SNS
etc.), by data classification or by application or workloads
Recommended to tying keys to data owners
AWS KMS : Access Management
Controlling access to your AWS KMS key
Key Policies
• Resource policy that is specific to individual key
• Primary way to control access to your key
• No principal including the key creator has any permissions to the key unless explicitely allowed
IAM Policies
• Policies attached to IAM entities can grant KMS permissions to many KMS keys in a single policy
• Control access to any AWS KMS operation
• Can not exclusively use IAM policies to allow access to a key, unless key policy explicitely allow
the IAM user/role access
Allows access to the AWS account and enables
IAM policies
It gives the AWS account that owns the KMS key full
access to the KMS key.
It allows the account to use IAM policies to allow
access to the KMS key, in addition to the key policy.
Without this permission, IAM policies that allow
access to the key are ineffective
Preventing unauthorized access to data
Access Management Use Cases
• CloudTrail to use AWS CMK
• Download S3 bucket object without KMS key permissions
• GuardDuty to export finding using KMS key in Audit account and
to S3 bucket in Log Archive account
AWS KMS : Monitoring with CloudWatch
Amazon CloudWatch can be used to alert on important events, such as the
following ones.
• The imported key material in a KMS key is nearing its expiration date.
• A KMS key that is pending deletion is still being used.
• The key material in a KMS key was automatically rotated.
• A KMS key was deleted.
Rotating AWS KMS keys
• Rotation change only KMS key material. Rest of the key metadata and access policies
remains same
• AWS KMS saves all previous versions of the cryptographic material in perpetuity so you can
decrypt any data encrypted with that KMS key.
• AWS KMS does not delete any rotated key material until you delete the KMS key.
• Does not rotate the data keys that the KMS key generated or re-encrypt any data protected
by the KMS key
KMS Multi-Region Keys
• Multi-region keys allow key replicas to be created in other AWS
Regions
• Useful when ciphertext in AWS Region A needs to be decrypted in
AWS Region B
S3 Encryption cost optimization
Historically, every object in S3
requested a data key provided by KMS
This can impact performance and
generate high cost on billions of objects
Bucket keys are intermediate key
S3 requests bucket keys from KMS and
uses these keys to derive data keys
Thank you
36

More Related Content

What's hot

AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018Amazon Web Services
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and securityErik Paulsson
 
Webinar aws 101 a walk through the aws cloud- introduction to cloud computi...
Webinar aws 101   a walk through the aws cloud- introduction to cloud computi...Webinar aws 101   a walk through the aws cloud- introduction to cloud computi...
Webinar aws 101 a walk through the aws cloud- introduction to cloud computi...Amazon Web Services
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWSIan Massingham
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerAmazon Web Services
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...Amazon Web Services
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAmazon Web Services
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatchAmazon Web Services
 
AWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionAWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionErnest Chiang
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCAmazon Web Services
 
AWS Systems manager 2019
AWS Systems manager 2019AWS Systems manager 2019
AWS Systems manager 2019John Varghese
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control TowerCloudHesive
 
Iam presentation
Iam presentationIam presentation
Iam presentationAWS UG PK
 

What's hot (20)

AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
AWS core services
AWS core servicesAWS core services
AWS core services
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
Webinar aws 101 a walk through the aws cloud- introduction to cloud computi...
Webinar aws 101   a walk through the aws cloud- introduction to cloud computi...Webinar aws 101   a walk through the aws cloud- introduction to cloud computi...
Webinar aws 101 a walk through the aws cloud- introduction to cloud computi...
 
ElastiCache & Redis
ElastiCache & RedisElastiCache & Redis
ElastiCache & Redis
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
AWS Security & Compliance
AWS Security & ComplianceAWS Security & Compliance
AWS Security & Compliance
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights Forum
 
Introduction to Amazon EKS
Introduction to Amazon EKSIntroduction to Amazon EKS
Introduction to Amazon EKS
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
 
AWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionAWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc Version
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPC
 
AWS Systems manager 2019
AWS Systems manager 2019AWS Systems manager 2019
AWS Systems manager 2019
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 

Similar to Introduction to AWS KMS

(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWSAmazon Web Services
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...Amazon Web Services
 
Protecting your data in AWS
Protecting your data in AWS Protecting your data in AWS
Protecting your data in AWS Dinah Barrett
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - TorontoAmazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Amazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 

Similar to Introduction to AWS KMS (20)

(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
 
Protecting your data in AWS
Protecting your data in AWS Protecting your data in AWS
Protecting your data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
 
Protecting Your Data in AWS
 Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
protecting your data in aws
protecting your data in aws protecting your data in aws
protecting your data in aws
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Aws kms in 10 minutes
Aws kms in 10 minutesAws kms in 10 minutes
Aws kms in 10 minutes
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 

Recently uploaded

The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 

Recently uploaded (20)

The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 

Introduction to AWS KMS

  • 2. Agenda • Service Introduction • Service Enablement • Design Patterns • Access Management • Best Practices 2
  • 3. Akesh Patil Sr. Cloud Architect Digital & Cloud Consulting AWS Community Builder | AWS APN Ambassador Speaker
  • 4. AWS KMS 4 AWS Key Management Service (AWS KMS) lets you create, manage, and control cryptographic keys across your applications and AWS services. What is AWS KMS? • Multi-Tenant, Managed service that makes it easy for you to create and control the encryption keys used to encrypt your data. • AWS KMS uses Hardware Security Modules (HSMs) to protect the security of your keys. • Scales to any workload with low latency and 99.999% public SLA • AWS KMS can be used to protect your data in AWS service and in your applications
  • 6. 6 KMS Key Hierarchy • Within AWS KMS, key hierarchy starts with a Customer Master Key (CMK) • CMK can be used directly to encrypt data blocks up to 4KB or it can be used to secure data keys • CMKs are broken down into two general types AWS-managed & Customer- managed • AWS KMS is integrated with over 100+ AWS services including all major databases, analytics, storage and workflow and productivity tools • Logging and monitoring provided by Amazon CloudWatch & CloudTrail
  • 7. AWS Managed Keys, Customer Managed Keys & AWS Owner Keys Customer Managed Key AWS Managed Key AWS Owned Key Policy Customer AWS AWS Audit Customer CloudTrail Customer CloudTrail None Rotation Customer AWS Fixed @ 3 Years Copy to other regions? Yes (For MRK keys) No Yes (Limited) Cost $1 per month Charges on API calls No cost on key or API calls
  • 8. Levels of Data Encryption
  • 9. Data Encryption with Symmetric AWS KMS Copy Rights Blazeclan Technologies Pvt. Ltd. 9 Create a data key 1 Encrypt data with data key 2 Decrypt data with data key 3
  • 10. Create a data key Generate data key with AWS KMS KMS returns plaintext and encrypted copy of data key
  • 11. Encrypt data with a data key Encrypt data outside of AWS KMS Use plaintext data key to encrypt the data Remove the plaintext data key from memory as soon as possible.
  • 12. Decrypt data with data key Decrypt data keys using AWS KMS Use the plaintext data key to decrypt your data Remove the plaintext data key from memory as soon as possible.
  • 13. Amazon EBS Encryption with EC2 Create encrypted EBS volume with KMS key Amazon EBS asks KMS to generate encrypted data key Amazon EBS stores the encrypted data key with the volume. Attach the EBS volume to an EC2 instance EC2 uses KMS key to decrypt the EBS volume's encrypted data key. EC2 stores the plaintext data key in hypervisor memory EC2 uses plaintext data key to encrypt disk I/O to the EBS volume Data key persists in the memory as long as long EBS volume is attached to instance
  • 14. How unusable KMS keys affect data keys? KMS keys can become unusable for a variety of reasons • Disabling KMS Key • Scheduling KMS Key deletion • Deleting the key material • Disconnecting the AWS CloudHSM key store • Disconnecting the external key store
  • 15. Impact of unusable KMS key on EBS encryption Create encrypted EBS volume with KMS key Amazon EBS asks KMS to generate encrypted data key Amazon EBS stores the encrypted data key with the volume. Attach the EBS volume to an EC2 instance EC2 uses KMS key to decrypt the EBS volume's encrypted data key. EC2 stores the plaintext data key in hypervisor memory Perform an action that makes the KMS key unusable Encrypted EBS volume is detached from the EC2 instance Amazon EBS removes the plaintext key from memory Encrypted EBS volume is attached to another EC2 instance Amazon EBS cannot use the KMS key to decrypt the volume's encrypted data key Attachment fails
  • 16. Data Encryption with Asymmetric AWS KMS Copy Rights Blazeclan Technologies Pvt. Ltd. 16 Create a data key pair 1 Encrypt data with a data key pair 2 Decrypt data with a data key pair 3
  • 17. Create a data key pair Generate data key pair with AWS KMS KMS returns plaintext public key, plaintext and encrypted copy of private key
  • 18. Encrypt data with a data key pair Encrypt data outside of AWS KMS Use plaintext public key to encrypt the data
  • 19. Decrypt data with a data key pair Decrypt private keys using AWS KMS Use the plaintext private key to decrypt your data Remove the plaintext private key from memory as soon as possible.
  • 20. AWS KMS : Design Patterns
  • 21. Centralized model Key Management account Key Policy Data encryption key Key Policy Data encryption key Customer Managed Key Aliases Key Policy Data encryption key Key Policy Data encryption key Customer Managed Key Aliases prod- ebs prod-rds nonprod -ebs nonprod -rds AWS KMS Production account Non-Production account KMS Usage Role KMS Usage Role
  • 22. Decentralized model AWS Account 11111111111 KMS Admin Role KMS Keys KMS Admin Role Admin 1 User 1 Assume Role Assume Role AWS Account 11111111111 KMS Admin Role KMS Keys AWS KMS KMS Admin Role Admin 1 User 1 Assume Role Assume Role
  • 23. How many keys I will need? Depends on the goals and security policies (e.g. is there preference for centralized or distributed?) Typically isolated by service (different keys for S3, Lambda, EKS, SNS etc.), by data classification or by application or workloads Recommended to tying keys to data owners
  • 24. AWS KMS : Access Management
  • 25. Controlling access to your AWS KMS key Key Policies • Resource policy that is specific to individual key • Primary way to control access to your key • No principal including the key creator has any permissions to the key unless explicitely allowed IAM Policies • Policies attached to IAM entities can grant KMS permissions to many KMS keys in a single policy • Control access to any AWS KMS operation • Can not exclusively use IAM policies to allow access to a key, unless key policy explicitely allow the IAM user/role access
  • 26. Allows access to the AWS account and enables IAM policies It gives the AWS account that owns the KMS key full access to the KMS key. It allows the account to use IAM policies to allow access to the KMS key, in addition to the key policy. Without this permission, IAM policies that allow access to the key are ineffective
  • 28. Access Management Use Cases • CloudTrail to use AWS CMK • Download S3 bucket object without KMS key permissions • GuardDuty to export finding using KMS key in Audit account and to S3 bucket in Log Archive account
  • 29. AWS KMS : Monitoring with CloudWatch Amazon CloudWatch can be used to alert on important events, such as the following ones. • The imported key material in a KMS key is nearing its expiration date. • A KMS key that is pending deletion is still being used. • The key material in a KMS key was automatically rotated. • A KMS key was deleted.
  • 30. Rotating AWS KMS keys • Rotation change only KMS key material. Rest of the key metadata and access policies remains same • AWS KMS saves all previous versions of the cryptographic material in perpetuity so you can decrypt any data encrypted with that KMS key. • AWS KMS does not delete any rotated key material until you delete the KMS key. • Does not rotate the data keys that the KMS key generated or re-encrypt any data protected by the KMS key
  • 31. KMS Multi-Region Keys • Multi-region keys allow key replicas to be created in other AWS Regions • Useful when ciphertext in AWS Region A needs to be decrypted in AWS Region B
  • 32. S3 Encryption cost optimization Historically, every object in S3 requested a data key provided by KMS This can impact performance and generate high cost on billions of objects Bucket keys are intermediate key S3 requests bucket keys from KMS and uses these keys to derive data keys