FAQs | Aws Cloud Hsm | Amazon Web Services (Aws) Flashcards
A Hardware Security Module (HSM) provides secure key storage and cryptographic operations within a tamper-resistant hardware device. HSMs are designed to securely store cryptographic key material and use the key material without exposing it outside the cryptographic boundary of the hardware.
Q: What is a Hardware Security Module (HSM)?
You can use the CloudHSM service to support a variety of use cases and applications, such as database encryption, Digital Rights Management (DRM), Public Key Infrastructure (PKI), authentication and authorization, document signing, and transaction processing.
Q: What can I do with CloudHSM?
No. To protect and isolate your AWS CloudHSM from other Amazon customers, CloudHSM must be provisioned inside an Amazon VPC. Creating a VPC is easy. Please see the VPC Getting Started Guide for more information.
Q: I don’t currently have a VPC. Can I still use AWS CloudHSM?
No, but the server or instance on which your application and the HSM client are running must have network (IP) reachability to all HSMs in the cluster. You can establish network connectivity from your application to the HSM in many ways, including operating your application in the same VPC, with VPC peering, with a VPN connection, or with Direct Connect. Please see the VPC Peering Guide and VPC User Guide for more details.
Q: Does my application need to reside in the same VPC as the CloudHSM Cluster?
Yes. While CloudHSM does not interoperate directly with on-premises HSMs, you can securely transfer exportable keys between CloudHSM and most commercial HSMs using one of several supported RSA key wrap methods.
Q: Does CloudHSM work with on-premises HSMs?
We have integrated and tested CloudHSM with a number of third-party software solutions such as Oracle Database 11g and 12c and Web servers including Apache and Nginx for SSL offload. Please see the CloudHSM User Guide for more information.
Q: How can my application use CloudHSM?
Yes. You can do all encryption in your CloudHSM-integrated application. In this case, AWS services such as Amazon S3 or Amazon Elastic Block Store (EBS) would only see your data encrypted.
Q: Can I use CloudHSM to store keys or encrypt data used by other AWS services?
AWS services integrate with AWS Key Management Service, which in turn is integrated with AWS CloudHSM through the KMS custom key store feature. If you want to use the server-side encryption offered by many AWS services (such as EBS, S3, or Amazon RDS), you can do so by configuring a custom key store in AWS KMS.
Q: Can other AWS services use CloudHSM to store and manage keys?
Currently, CloudHSM provides general-purpose HSMs. Over time we may provide payment functions. If this is of interest to you, please let us know.
Q: Can CloudHSM be used to perform personal identification number (PIN) block translation or other cryptographic operations used with debit payment transactions
You can provision a CloudHSM Cluster in the CloudHSM Console, or with a few API calls through the AWS SDK or API. To learn more, please see the CloudHSM User Guide for information about getting started, the CloudHSM Documentation for information about the CloudHSM API, or the Tools for Amazon Web Services page for more information about the SDK.
Q: How do I get started with CloudHSM?
You can use the CloudHSM console, API, or SDK to delete your HSMs and stop using the service. Please refer to the CloudHSM User Guide for further instructions.
Q: How do I terminate CloudHSM service?
You will be charged an hourly fee for each hour (or partial hour) that an HSM is provisioned to a CloudHSM Cluster. A cluster with no HSMs in it is not billed, nor are you billed for our automatic storage of encrypted backups. For more information, please visit the CloudHSM pricing page. Note that network data transfers to and from your HSMs are charged separately. For more information please review data transfer pricing for EC2.
Q: How will I be charged and billed for my use of the AWS CloudHSM service?
No, there is no free tier available for CloudHSM.
Q: Is there a Free Tier for the CloudHSM service?
No, the hourly fee, which varies by region, does not depend on how much you use your HSM.
Q: Do charges vary depending on how many users or keys I create on my HSM?
No, we do not offer reserved instance pricing for CloudHSM.
Q: Do you offer reserved instance pricing for CloudHSM?
Yes. In order to start using CloudHSM there are a few prerequisites, including a Virtual Private Cloud (VPC) in the region where you want CloudHSM service. Refer to the CloudHSM User Guide for more details.
Q: Are there any prerequisites for using CloudHSM?
No. AWS manages the firmware on the hardware. Firmware is maintained by a third-party, and every firmware must be evaluated by NIST for FIPS 140-2 Level 3 compliance. Only firmware that has been cryptographically signed by the FIPS key (which AWS does not have access to) can be installed.
Q: Do I need to manage the firmware on my HSM?
AWS strongly recommends that you use at least two HSMs in two different Availability Zones for any production workload. For mission-critical workloads, we recommend at least three HSMs in at least two separate AZs. The CloudHSM client will automatically handle any HSM failures and load balance across two or more HSMs transparently to your application.
Q: How many HSMs should I have in my CloudHSM Cluster?
High availability is provided automatically when you have at least two HSMs in your CloudHSM Cluster. No additional configuration is required. In the event an HSM in your cluster fails, it will be replaced automatically, and all clients will be updated to reflect the new configuration without interrupting any processing. Additional HSMs can be added to the cluster via the AWS API or SDK, increasing availability without interrupting your application.
Q: How do I set up a high availability (HA) configuration?
A single CloudHSM Cluster can contain up to 28 HSMs, subject to account service limits. You can learn more about service limits and how to request a limit increase in our online documentation.
Q: How many HSMs can be contained in a CloudHSM Cluster?
Your CloudHSM Cluster is backed up on a daily basis by AWS. Keys can also be exported (“wrapped”) out of your cluster and stored on-premises as long as they were not generated as “non-exportable”. No other backup options are available at this time, though we expect to provide a more comprehensive on-premises backup capability soon.
Q: Can I back up the contents of a CloudHSM?
Yes, you can find the service level agreement (SLA) for AWS CloudHSM here.
Q: Is there an SLA for CloudHSM?
No. As part of the service you receive single-tenant access to the HSM. Underlying hardware may be shared with other customers, but the HSM is accessible only to you.
Q: Do I share my CloudHSM with other AWS customers?
Separation of duties and role-based access control is inherent in the design of CloudHSM. AWS has a limited credential to the HSM that permits us to monitor and maintain the health and availability of the HSM, take encrypted backups, and to extract and publish audit logs to your CloudWatch Logs AWS has no access to any keys or data inside your CloudHSM cluster and cannot perform any operations other than those allowed for an HSM appliance user.
Q: How does AWS manage the HSM without having access to my encryption keys?
Yes. CloudHSM publishes multiple CloudWatch metrics for CloudHSM Clusters and for individual HSMs. You can use the AWS CloudWatch Console, API or SDK to obtain or alarm on these metrics.
Q: Can I monitor my HSM?
Each HSM has a FIPS-validated Deterministic Random Bit Generator (DRBG) that is seeded by a True Random Number Generator (TRNG) within the HSM hardware module that conforms to SP800-90B. This is a high-quality entropy source capable of producing 20Mb/sec of entropy per HSM.
Q: What is the ‘entropy source’ (source of randomness) for CloudHSM?
If your CloudHSM cluster only has a single HSM, yes it is possible to lose keys that were created since the most recent daily backup. CloudHSM clusters with two or more HSMs, ideally in separate Availability Zones, will not lose keys if a single HSM fails. See our best practices for more information.
Q: Could I lose my keys if a single HSM fails?
No. Amazon does not have access to your keys or credentials and therefore has no way to recover your keys if you lose your credentials.
Q: Can Amazon recover my keys if I lose my credentials to my HSM?
CloudHSM is built on hardware that is validated at Federal Information Processing Standard (FIPS) 140-2 Level 3. You can find information about the FIPS 140-2 Security Profile for the hardware used by CloudHSM, and the firmware it runs, at our compliance page.
Q: How do I know that I can trust CloudHSM?
Yes, CloudHSM provides FIPS 140-2 Level 3 validated HSMs. You can follow the procedure in the CloudHSM User Guide under Verify the Authenticity of Your HSM to confirm that you have an authentic HSM on the same model hardware specified in the NIST Security Policy described in the previous question.
Q: Does the CloudHSM service support FIPS 140-2 Level 3?
CloudHSM is always in FIPS 140-2 mode. This can be verified by using the CLI tools as documented in the CloudHSM User Guide and running the getHsmInfo command, which will indicate the FIPS mode status.
Q: How do I operate a CloudHSM in FIPS 140-2 mode?
Yes. AWS CloudTrail records AWS API calls for your account. The AWS API call history produced by CloudTrail lets you perform security analysis, resource change tracking, and compliance auditing. Learn more about CloudTrail at the CloudTrail home page, and turn it on via CloudTrail's AWS Management Console.
Q: Can I get a history of all CloudHSM API calls made from my account?
CloudTrail does not include any of the HSM device or access logs. These are provided directly to your AWS account via CloudWatch Logs. See the CloudHSM User Guide for more details.
Q: Which events are not logged in CloudTrail?
Please refer to the AWS Compliance site for more information about which compliance programs cover CloudHSM. Unlike other AWS services, compliance requirements regarding CloudHSM are often met directly by the FIPS 140-2 Level 3 validation of the hardware itself, rather than as part of a separate audit program.
Q: Which AWS compliance initiatives include CloudHSM?
FIPS 140-2 Level 3 is a requirement of certain use cases, including document signing, payments, or operating as a public Certificate Authority for SSL certificates.
Q: Why is FIPS 140-2 Level 3 important?
To see what compliance reports are in scope for CloudHSM, review the data on AWS Services in Scope by Compliance Program. To create free, self-service, on-demand compliance reports, use AWS Artifact.
Q: How can I request compliance reports that include CloudHSM in scope?
The performance of the individual HSMs varies based on the specific workload. The table below shows approximate single-HSM performance for several common cryptographic algorithms. You can create up to 28 HSMs in each CloudHSM Cluster, so you can achieve up to ~28x the performance of the table listed below per cluster. Performance can vary based on exact configuration and data sizes, so we encourage load testing your application with CloudHSM to determine exact scaling needs.
Q: How many crypto operations per second can CloudHSM perform?
A CloudHSM cluster can store approximately 3,300 keys of any type or size.
Q: How many keys can be stored on a CloudHSM cluster?
Not directly. You should use AWS Key Management Service with Custom Key Store to secure Amazon RDS data using keys generated and stored in your AWS CloudHSM cluster.
Q: Does CloudHSM support Amazon RDS Oracle TDE?
Several third-party vendors support AWS CloudHSM as a root of trust. This means that you can utilize a software solution of your choice while creating and storing the underlying keys in your CloudHSM cluster.
Q: Can I use CloudHSM as a root of trust for other software?
The CloudHSM Client is a software package supplied by AWS that allows you and your applications to interact with CloudHSM Clusters.
Q: What is the CloudHSM Client?
No. All communication between the client and your HSM is encrypted end to end. AWS cannot see or intercept this communication, and has no visibility into your cluster access credentials.
Q: Does the CloudHSM Client give AWS access to my CloudHSM Cluster?
The CloudHSM Client comes with a set of CLI tools that allow you to administrate and use the HSM from the command line. Linux and Microsoft Windows are supported today. Support for Apple macOS is on our roadmap. These tools are available in the same package as the CloudHSM Client.
Q: What are the CloudHSM Command Line Interface (CLI) Tools?
You’ll find instructions in the CloudHSM User Guide.
Q: How can I download and get started with the CloudHSM Command Line Interface Tools?
No. The CloudHSM Tools communicate directly with your CloudHSM Cluster via the CloudHSM Client over a secured, mutually authenticated channel. AWS cannot observe any communication between the client, tools, and HSM, it is encrypted end-to-end.
Q: Do the CloudHSM CLI Tools provide AWS with access to the contents of the HSM?
A complete list of supported operating systems is provided in our online documentation.
Q: On what operating systems can I use the CloudHSM Client and CLI Tools?
The host on which you are running the CloudHSM Client and/or using the CLI Tools must have network reachability to all of the HSMs in your CloudHSM Cluster.
Q: What are the network connectivity requirements for using the CloudHSM Command Line Interface Tools?
Start by ensuring that the algorithms and modes you require are supported by CloudHSM. Your account manager can submit feature requests to us if needed. Next, determine your key rotation strategy. Suggestions for common use cases are in the next Q/A. We have also published an in-depth migration guide for CloudHSM. You're now ready to get started with CloudHSM.
Q: How should I plan my migration to AWS CloudHSM?
Your rotation strategy will depend on the type of application. Common examples are below.
Q: How can I rotate my keys?
No, but AWS may need to conduct maintenance in the event of necessary upgrades or faulty hardware. We will make every effort to notify you in advance via the Personal Health Dashboard if any impact is expected.
Q: Does AWS CloudHSM have scheduled maintenance windows?
You can find solutions to common problems in our troubleshooting guide. If you are still experiencing issues, contact AWS Support.
Q: I am having a problem with CloudHSM. What do I do?