Introduction of AWS KMS

16
ENCRYPTION WITH AWS KMS Key Management Service

Transcript of Introduction of AWS KMS

Page 1: Introduction of AWS KMS

ENCRYPTION WITH AWS KMS

Key Management Service

Page 2: Introduction of AWS KMS

# whoami

DevOps Engineer | BrazilianEnjoys security and cloud automation

2015 was a big yearau.linkedin.com/in/ricardoxmit

Page 3: Introduction of AWS KMS

What to expect today?

• Understand options for protecting your data

• Understand how KMS works• Services that KMS is integrated with• S3 and KMS• EBS and KMS• Demo

Page 4: Introduction of AWS KMS

What’s the main problem?

Page 5: Introduction of AWS KMS

Options for encryption

1.Do it yourself2.AWS Marketplace -> partner

solutions3.Use AWS KMS4.HSM - Hardware Security

Module

Page 6: Introduction of AWS KMS

If you don't use a service to manage your keys…

• Keys that live in config files are exposed

- Application vulnerabilities, OS vulnerabilities, staff turnover• It’s hard to track how the keys are being

used• Rotating keys can be painful

Page 7: Introduction of AWS KMS

AWS Key Management Service (KMS)

• Managed service that simplifies creation, control, rotation, and use of encryption keys in your applications

• Integrated with AWS server-side encryption • S3, EBS, RDS, Amazon Aurora, Amazon

Redshift, WorkMail, Amazon WorkSpaces, CloudTrail, and Amazon Elastic Transcoder

Page 8: Introduction of AWS KMS

"Keys" considerations with any solution

• Where are the keys stored? • Where are keys used? • Who has access to the keys?• How can you make sure keys are being

used for the correct people/applications?

Page 9: Introduction of AWS KMS

Type of keys

• Symmetric key -> same key to encrypt and decrypt.

• Asymmetric key -> public / private key concept.

KMS uses Symmetric Encryption -> 256-bit AES for master key

Page 10: Introduction of AWS KMS

Options to encrypt you data using KMS

1. Client-side encryption - you encrypt your data BEFORE data submitted to service.

2. Server-side encryption - AWS encrypts data on your behalf AFTER data is received by service.

Page 11: Introduction of AWS KMS

AWS KMS gives you control

You define who can:• create key• use a key• enable/disable keys• audit use of keys using cloudtrail

Page 12: Introduction of AWS KMS

How do I use KMS?Create Keys in KMS• Give a name and description to the

key• Choose the IAM users and roles

that can administer this key• Choose the IAM users and roles

that can use this key to encrypt and decrypt data

• A new policy will be created

Page 13: Introduction of AWS KMS

KMS with EBS

Page 14: Introduction of AWS KMS

KMS with S3

Page 15: Introduction of AWS KMS

Considerations about KMS

• Keys are regionals. Re-encrypt your data with you move date between regions.

• Direct encryption is limited to 4k of data to optimize latency.

• Use envelope encryption with data keys for larger messages.

Page 16: Introduction of AWS KMS

DEMO