SlideShare a Scribd company logo
1 of 40
Download to read offline
©2015,  Amazon  Web  Services,  Inc.  or  its  affiliates.  All  rights  reserved
Encryption and Key Management
in AWS
Bill Shinn
Principal Security Solutions Architect
Agenda
•  Client-Side Encryption: You encrypt your data and
manage your own keys
•  Server-Side Encryption: AWS encrypts data and
manages the keys for you
•  Key Management:
–  On your own
–  AWS Key Management Service
–  With AWS partner solutions
–  Using AWS CloudHSM
“Key” Questions to Consider
•  Where are the keys stored?
•  Where are the keys used?
•  Who has access to the keys?
Encryption Primer
Plaintext
Data
Hardware/
Software
Encrypted
Data
Encrypted
Data in Storage
Encrypted
Data Key
Symmetric
Data Key
Master KeySymmetric
Data Key
? Key Hierarchy
?
Client-Side Encryption
You encrypt your data and send to AWS service
Client-Side Encryption
Your applications in your
data center
Your applications in
Amazon EC2Encrypted
Data
AWS Storage Services
S3 Glacier Redshift RDSEBS DynamoDB
Client-Side Encryption
Overview
Your encryption
client application
Your key management
infrastructure
Your
applications
in your data
center
Your application in
Amazon EC2
Your key
management
infrastructure in EC2
Your Encrypted Data in AWS Services
…
Client-Side Encryption with S3
Amazon S3 Encryption Client with AWS SDKs
Your key management
infrastructure
Your
applications
in your data
center
Your key
management
infrastructure in EC2
Your Encrypted Data in Amazon S3
Your application in
Amazon EC2
AWS SDK with
S3 Encryption Client
Client-Side Encryption
Amazon S3 Encryption Client with AWS SDKs
•  Client creates dynamic 256-bit data key
•  You supply the key-encrypting key
–  Symmetric or asymmetric (public portion)
•  Uses JCE (can optionally configure crypto provider)
to encrypt/decrypt data in your application
•  Encrypted data key sent to S3; stored with encrypted
data as object metadata or instruction file
•  Available in Java, Ruby and .NET
AWS SDKs
Server-Side Encryption
AWS services encrypt data for you
Server-Side Encryption
HTTPS
Your applications in your
data center
Your applications in
Amazon EC2
AWS Storage Services
S3 Glacier Redshift RDS for
Oracle
RDS for
MS-SQL
EBS
S3 Server Side Encryption
How S3 SSE with AWS Managed Keys
Works
Plaintext
Data
Encrypted
Data
Symmetric
Data KeyS3 Web Server
HTTPS
Customer
Data
Encrypted
Data Key
Master KeySymmetric
Data Key
S3 Storage
Fleet
A master key managed by the S3 service and
protected by systems internal to AWS
How S3 SSE with Customer Provided Keys
Works
Plaintext
Data
Encrypted
Data
Customer
Provided KeyS3 Web Server
HTTPS
Customer
Data
S3 Storage
Fleet
•  Key is used at S3 Webserver, then deleted
•  Customer must provide same key when
downloading to allow S3 to decrypt data
Customer
Provided Key
EBS Server Side Encryption
What About Key Management
Infrastructure?
Your encryption
client application
Your
applications
in your data
center
Your application in
Amazon EC2
Your Encrypted Data in AWS Services
…
Your key
management
infrastructure in EC2
Your key management
infrastructure
Introducing AWS Key Management Service
•  A service that enables you to provision and use encryption keys to protect
your data
•  Allows you to create, use, and manage encryption keys from within…
–  Your own applications via AWS SDK
–  Supported AWS services (S3, EBS, RDS, Redshift)
•  Available in all commercial regions
How AWS Key Management Service
Works
Crypto
operations on
customer
master keys
KMS Service
Endpoint
Client
(Customer or
AWS Service)
Data
Durable, Encrypted Key
Store
AWS
Authorization
Client AuthN
and AuthZ
1
2
3
4 +
Data Key Encrypted Data Key
1.  Client makes authenticated request of KMS for data key
2.  KMS generates data key
3.  KMS pulls encrypted customer master key from durable storage; decrypts in the
KMS crypto module
4.  KMS encrypts data key with named customer master key and returns plaintext
data key and encrypted data key
5.  Client uses data key to encrypt data, stores encrypted data key.
To decrypt: client submits encrypted data key to KMS for decryption; data key is
needed to decrypt data
KMS crypto module
5
How AWS Services Integrate with KMS
•  2-tiered key hierarchy using envelope
encryption
•  Data keys encrypt customer data
•  KMS master keys encrypt data keys
•  Benefits:
•  Limits blast radius of compromised
resources and their keys
•  Better performance
•  Easier to manage a small number of master
keys than billions of resource keys
Master Key(s)
Data Key 1
S3 Object EBS
Volume
RDS
Instance
Redshift
Cluster
Data encrypted
Data Key 2 Data Key 3 Data Key 4 Data Key 5
Your
Application
Keys encrypted
KMS
Creating and managing keys in KMS
Amazon S3 server-side encryption with KMS
Amazon EBS encryption with KMS
Amazon RDS encryption with KMS
Amazon Redshift encryption with KMS
KMS gives you control
You define who can…
•  Create a master key
•  Use a master key
•  Create and export a data key that is encrypted
by a master key
•  Enable/disable master keys
•  Audit use of master keys in AWS CloudTrail
KMS secures your keys
•  Plaintext keys are never stored in persistent
memory on runtime systems
•  Separation of duties
–  AWS service team operators (S3, EBS, RDS) can’t access KMS
hosts that use master keys and KMS operators can’t access service
team hosts that use data keys
•  Multi-party controls
–  Normal operations require signatures from two or more KMS
operators on any API calls to an active host processing customer
keys
•  Verified claims in SOC1 and public white papers
Alternate key management and
encryption solutions
AWS Marketplace for Security
•  Browse, test and buy
security software
•  Pay-by-the-hour,
monthly, or annual
•  Software fees added
to AWS bill
•  Bring Your Own
License
Key management and client-side
encryption using an AWS partner
solution
Solutions integrated with EC2, EBS, S3, and RDS
Encryption and Key Management with AWS
CloudHSM
HSM – Hardware Security Module
•  Hardware device for crypto ops and key storage
•  Strong protection of private keys
–  Physical device control does not grant access to the keys
–  Security officer controls access to the keys
–  Appliance administrator has no access to the keys
•  Certified by 3rd parties to comply with security standards
HSM
AWS CloudHSM
•  You receive dedicated access to HSM
appliances
•  HSMs are located in AWS datacenters
•  Managed & monitored by AWS
•  Only you have access to your keys and
operations on the keys
•  HSMs are inside your VPC – isolated
from the rest of the network
•  Uses SafeNet Luna SA HSM appliances
CloudHSM
AWS Administrator –
manages the appliance
You – control keys and crypto
operations
Virtual Private Cloud
AWS CloudHSM
•  Available in five regions worldwide
–  US East (N. Virginia), US West (Oregon), EU (Ireland), EU
(Frankfurt) and Asia Pacific (Sydney) (and more on the way)
•  Easy to get started
–  AWS CloudFormation template
–  Application notes to help integrate with 3rd party software
•  Compliance
–  Included in AWS PCI DSS and Service Organization Control
(SOC) compliance packages
Database Encryption
•  Customer-managed databases in EC2
–  Oracle Database 11g TDE (Transparent Data Encryption)
–  Microsoft SQL Server 2008 and 2012 TDE
–  Master key in CloudHSM
CloudHSM Your database
with TDE in EC2
Master key is created in
the HSM and never
leaves
Your applications
in EC2
SafeNet ProtectV Manager
and Virtual KeySecure
in EC2
EBS Volume Encryption
•  SafeNet ProtectV with Virtual KeySecure
•  CloudHSM stores the master key
SafeNet
ProtectV
Client
CloudHSM
Your encrypted data
in Amazon EBS
Your applications
in EC2
ProtectV Client
•  Encrypts I/O from EC2
instances to EBS
volumes
•  Includes pre-boot
authentication
Redshift Encryption
•  Cluster master key in on-premises SafeNet HSM or
CloudHSM
•  No special client software required
Your
applications
in EC2
Redshift Cluster
Your encrypted data
in Redshift
CloudHSM
CloudHSM: Custom Software Applications
An architectural building block to help you secure your own
applications
•  Use standard libraries, with backend HSM rather than software-
based crypto
–  PKCS#11, JCA/JCE, Microsoft CAPI/CNG
•  Code examples and details in the CloudHSM Getting Started Guide
make it easier to get started (aws.amazon.com/cloudhsm)
Comparing CloudHSM with KMS
AWS CloudHSM
•  Dedicated access to HSM that
complies with government
standards (FIPS, CC)
•  You control your keys and the
application software that uses
them
AWS KMS
•  Builds on the strong
protections of an HSM
foundation
•  Highly available and durable
key storage, management, and
auditing solution
•  Easily encrypt your data
across AWS services and
within your own applications
based on policies you define
Comparison of Key Management
Options On-Premises HSM AWS CloudHSM AWS Key Management
Service
Where keys are
generated and stored
Your network AWS AWS
Where keys are used Your network or your
EC2 instance
AWS + your network AWS
How to use keys Customer code Customer code +
Safenet APIs
Management Console,
AWS SDKs
Performance/Scale/HA
responsibility
You You AWS
Integration with AWS
services?
No Redshift Yes
Price $$$$ $$ $
Who controls access to
keys
Only You Only You You + AWS
Resources
•  AWS Key Management Service
–  https://aws.amazon.com/kms
•  AWS CloudHSM
–  https://aws.amazon.com/cloudhsm/
•  Whitepaper on data-at-rest encryption and key management in AWS
–  https://aws.amazon.com/whitepapers/
•  S3 Encryption Client
–  http://aws.amazon.com/articles/2850096021478074
•  AWS Partner Network
–  http://www.aws-partner-directory.com/
•  AWS Security Blog
–  http://blogs.aws.amazon.com/security

More Related Content

What's hot

Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksAmazon Web Services
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
AWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best PracticesAWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best PracticesAmazon Web Services
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Amazon Web Services
 
SID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CASID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CAAmazon Web Services
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesGary Silverman
 
AWS Storage - S3 Fundamentals
AWS Storage - S3 FundamentalsAWS Storage - S3 Fundamentals
AWS Storage - S3 FundamentalsPiyush Agrawal
 
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Amazon Web Services
 
Protecting Your Data with Encryption on AWS
Protecting Your Data with Encryption on AWSProtecting Your Data with Encryption on AWS
Protecting Your Data with Encryption on AWSAmazon Web Services
 
Intro to Amazon S3
Intro to Amazon S3Intro to Amazon S3
Intro to Amazon S3Yu Lun Teo
 

What's hot (20)

Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
AWS for Backup and Recovery
AWS for Backup and RecoveryAWS for Backup and Recovery
AWS for Backup and Recovery
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
 
Amazon S3 Masterclass
Amazon S3 MasterclassAmazon S3 Masterclass
Amazon S3 Masterclass
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
AWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best PracticesAWS Multi-Account Architecture and Best Practices
AWS Multi-Account Architecture and Best Practices
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
SID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CASID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CA
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best Practices
 
Amazon GuardDuty Lab
Amazon GuardDuty LabAmazon GuardDuty Lab
Amazon GuardDuty Lab
 
AWS Storage - S3 Fundamentals
AWS Storage - S3 FundamentalsAWS Storage - S3 Fundamentals
AWS Storage - S3 Fundamentals
 
AWS IAM
AWS IAMAWS IAM
AWS IAM
 
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
 
Protecting Your Data with Encryption on AWS
Protecting Your Data with Encryption on AWSProtecting Your Data with Encryption on AWS
Protecting Your Data with Encryption on AWS
 
Intro to Amazon S3
Intro to Amazon S3Intro to Amazon S3
Intro to Amazon S3
 
AWS PrivateLink Fundamentals
AWS PrivateLink FundamentalsAWS PrivateLink Fundamentals
AWS PrivateLink Fundamentals
 

Viewers also liked

AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...Amazon Web Services
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Amazon Web Services
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Amazon Web Services
 

Viewers also liked (6)

AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
AWS re:Invent 2016: Get the Most from AWS KMS: Architecting Applications for ...
 
Crypto Options in AWS
Crypto Options in AWSCrypto Options in AWS
Crypto Options in AWS
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
 

Similar to Encryption and Key Management in AWS

AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAmazon Web Services
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAmazon Web Services
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)Amazon Web Services
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - TorontoAmazon Web Services
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWSAmazon Web Services
 
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014Amazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Protecting your data in AWS
Protecting your data in AWS Protecting your data in AWS
Protecting your data in AWS Dinah Barrett
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMSAkesh Patil
 
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도Amazon Web Services Korea
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 

Similar to Encryption and Key Management in AWS (20)

AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
Protecting Your Data in AWS
 Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
protecting your data in aws
protecting your data in aws protecting your data in aws
protecting your data in aws
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting your data in AWS
Protecting your data in AWS Protecting your data in AWS
Protecting your data in AWS
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMS
 
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Encryption and Key Management in AWS

  • 1. ©2015,  Amazon  Web  Services,  Inc.  or  its  affiliates.  All  rights  reserved Encryption and Key Management in AWS Bill Shinn Principal Security Solutions Architect
  • 2. Agenda •  Client-Side Encryption: You encrypt your data and manage your own keys •  Server-Side Encryption: AWS encrypts data and manages the keys for you •  Key Management: –  On your own –  AWS Key Management Service –  With AWS partner solutions –  Using AWS CloudHSM
  • 3. “Key” Questions to Consider •  Where are the keys stored? •  Where are the keys used? •  Who has access to the keys?
  • 4. Encryption Primer Plaintext Data Hardware/ Software Encrypted Data Encrypted Data in Storage Encrypted Data Key Symmetric Data Key Master KeySymmetric Data Key ? Key Hierarchy ?
  • 5. Client-Side Encryption You encrypt your data and send to AWS service
  • 6. Client-Side Encryption Your applications in your data center Your applications in Amazon EC2Encrypted Data AWS Storage Services S3 Glacier Redshift RDSEBS DynamoDB
  • 7. Client-Side Encryption Overview Your encryption client application Your key management infrastructure Your applications in your data center Your application in Amazon EC2 Your key management infrastructure in EC2 Your Encrypted Data in AWS Services …
  • 8. Client-Side Encryption with S3 Amazon S3 Encryption Client with AWS SDKs Your key management infrastructure Your applications in your data center Your key management infrastructure in EC2 Your Encrypted Data in Amazon S3 Your application in Amazon EC2 AWS SDK with S3 Encryption Client
  • 9. Client-Side Encryption Amazon S3 Encryption Client with AWS SDKs •  Client creates dynamic 256-bit data key •  You supply the key-encrypting key –  Symmetric or asymmetric (public portion) •  Uses JCE (can optionally configure crypto provider) to encrypt/decrypt data in your application •  Encrypted data key sent to S3; stored with encrypted data as object metadata or instruction file •  Available in Java, Ruby and .NET AWS SDKs
  • 10. Server-Side Encryption AWS services encrypt data for you
  • 11. Server-Side Encryption HTTPS Your applications in your data center Your applications in Amazon EC2 AWS Storage Services S3 Glacier Redshift RDS for Oracle RDS for MS-SQL EBS
  • 12. S3 Server Side Encryption
  • 13. How S3 SSE with AWS Managed Keys Works Plaintext Data Encrypted Data Symmetric Data KeyS3 Web Server HTTPS Customer Data Encrypted Data Key Master KeySymmetric Data Key S3 Storage Fleet A master key managed by the S3 service and protected by systems internal to AWS
  • 14. How S3 SSE with Customer Provided Keys Works Plaintext Data Encrypted Data Customer Provided KeyS3 Web Server HTTPS Customer Data S3 Storage Fleet •  Key is used at S3 Webserver, then deleted •  Customer must provide same key when downloading to allow S3 to decrypt data Customer Provided Key
  • 15. EBS Server Side Encryption
  • 16. What About Key Management Infrastructure? Your encryption client application Your applications in your data center Your application in Amazon EC2 Your Encrypted Data in AWS Services … Your key management infrastructure in EC2 Your key management infrastructure
  • 17. Introducing AWS Key Management Service •  A service that enables you to provision and use encryption keys to protect your data •  Allows you to create, use, and manage encryption keys from within… –  Your own applications via AWS SDK –  Supported AWS services (S3, EBS, RDS, Redshift) •  Available in all commercial regions
  • 18. How AWS Key Management Service Works Crypto operations on customer master keys KMS Service Endpoint Client (Customer or AWS Service) Data Durable, Encrypted Key Store AWS Authorization Client AuthN and AuthZ 1 2 3 4 + Data Key Encrypted Data Key 1.  Client makes authenticated request of KMS for data key 2.  KMS generates data key 3.  KMS pulls encrypted customer master key from durable storage; decrypts in the KMS crypto module 4.  KMS encrypts data key with named customer master key and returns plaintext data key and encrypted data key 5.  Client uses data key to encrypt data, stores encrypted data key. To decrypt: client submits encrypted data key to KMS for decryption; data key is needed to decrypt data KMS crypto module 5
  • 19. How AWS Services Integrate with KMS •  2-tiered key hierarchy using envelope encryption •  Data keys encrypt customer data •  KMS master keys encrypt data keys •  Benefits: •  Limits blast radius of compromised resources and their keys •  Better performance •  Easier to manage a small number of master keys than billions of resource keys Master Key(s) Data Key 1 S3 Object EBS Volume RDS Instance Redshift Cluster Data encrypted Data Key 2 Data Key 3 Data Key 4 Data Key 5 Your Application Keys encrypted KMS
  • 20. Creating and managing keys in KMS
  • 21. Amazon S3 server-side encryption with KMS
  • 25. KMS gives you control You define who can… •  Create a master key •  Use a master key •  Create and export a data key that is encrypted by a master key •  Enable/disable master keys •  Audit use of master keys in AWS CloudTrail
  • 26. KMS secures your keys •  Plaintext keys are never stored in persistent memory on runtime systems •  Separation of duties –  AWS service team operators (S3, EBS, RDS) can’t access KMS hosts that use master keys and KMS operators can’t access service team hosts that use data keys •  Multi-party controls –  Normal operations require signatures from two or more KMS operators on any API calls to an active host processing customer keys •  Verified claims in SOC1 and public white papers
  • 27. Alternate key management and encryption solutions
  • 28. AWS Marketplace for Security •  Browse, test and buy security software •  Pay-by-the-hour, monthly, or annual •  Software fees added to AWS bill •  Bring Your Own License
  • 29. Key management and client-side encryption using an AWS partner solution Solutions integrated with EC2, EBS, S3, and RDS
  • 30. Encryption and Key Management with AWS CloudHSM
  • 31. HSM – Hardware Security Module •  Hardware device for crypto ops and key storage •  Strong protection of private keys –  Physical device control does not grant access to the keys –  Security officer controls access to the keys –  Appliance administrator has no access to the keys •  Certified by 3rd parties to comply with security standards HSM
  • 32. AWS CloudHSM •  You receive dedicated access to HSM appliances •  HSMs are located in AWS datacenters •  Managed & monitored by AWS •  Only you have access to your keys and operations on the keys •  HSMs are inside your VPC – isolated from the rest of the network •  Uses SafeNet Luna SA HSM appliances CloudHSM AWS Administrator – manages the appliance You – control keys and crypto operations Virtual Private Cloud
  • 33. AWS CloudHSM •  Available in five regions worldwide –  US East (N. Virginia), US West (Oregon), EU (Ireland), EU (Frankfurt) and Asia Pacific (Sydney) (and more on the way) •  Easy to get started –  AWS CloudFormation template –  Application notes to help integrate with 3rd party software •  Compliance –  Included in AWS PCI DSS and Service Organization Control (SOC) compliance packages
  • 34. Database Encryption •  Customer-managed databases in EC2 –  Oracle Database 11g TDE (Transparent Data Encryption) –  Microsoft SQL Server 2008 and 2012 TDE –  Master key in CloudHSM CloudHSM Your database with TDE in EC2 Master key is created in the HSM and never leaves Your applications in EC2
  • 35. SafeNet ProtectV Manager and Virtual KeySecure in EC2 EBS Volume Encryption •  SafeNet ProtectV with Virtual KeySecure •  CloudHSM stores the master key SafeNet ProtectV Client CloudHSM Your encrypted data in Amazon EBS Your applications in EC2 ProtectV Client •  Encrypts I/O from EC2 instances to EBS volumes •  Includes pre-boot authentication
  • 36. Redshift Encryption •  Cluster master key in on-premises SafeNet HSM or CloudHSM •  No special client software required Your applications in EC2 Redshift Cluster Your encrypted data in Redshift CloudHSM
  • 37. CloudHSM: Custom Software Applications An architectural building block to help you secure your own applications •  Use standard libraries, with backend HSM rather than software- based crypto –  PKCS#11, JCA/JCE, Microsoft CAPI/CNG •  Code examples and details in the CloudHSM Getting Started Guide make it easier to get started (aws.amazon.com/cloudhsm)
  • 38. Comparing CloudHSM with KMS AWS CloudHSM •  Dedicated access to HSM that complies with government standards (FIPS, CC) •  You control your keys and the application software that uses them AWS KMS •  Builds on the strong protections of an HSM foundation •  Highly available and durable key storage, management, and auditing solution •  Easily encrypt your data across AWS services and within your own applications based on policies you define
  • 39. Comparison of Key Management Options On-Premises HSM AWS CloudHSM AWS Key Management Service Where keys are generated and stored Your network AWS AWS Where keys are used Your network or your EC2 instance AWS + your network AWS How to use keys Customer code Customer code + Safenet APIs Management Console, AWS SDKs Performance/Scale/HA responsibility You You AWS Integration with AWS services? No Redshift Yes Price $$$$ $$ $ Who controls access to keys Only You Only You You + AWS
  • 40. Resources •  AWS Key Management Service –  https://aws.amazon.com/kms •  AWS CloudHSM –  https://aws.amazon.com/cloudhsm/ •  Whitepaper on data-at-rest encryption and key management in AWS –  https://aws.amazon.com/whitepapers/ •  S3 Encryption Client –  http://aws.amazon.com/articles/2850096021478074 •  AWS Partner Network –  http://www.aws-partner-directory.com/ •  AWS Security Blog –  http://blogs.aws.amazon.com/security