How do AWS services access/authenticate/authorize to CloudHSM?

0

Are AWS services assigned IAM roles that allow them to access the CloudHSM API....and then use the CloudHSM client Crypto User account to complete their task encrypt/decrypt task? If no, how does an AWS service access CloudHSM?

If unlike, AWS KMS, lots of services do not integrate with CloudHSM, how do they use it? Or, do only a few services use CloudHSM while the ones that integrate with Cloud KMS go that route? Is anyone aware of list of services that integrate with CloudHSM? I've been researching this for two days.

2 Risposte
0

If you're using AWS services, integrate them with AWS Key Management Service, and then KMS integrates with CloudHSM as a custom key store.

Integrating AWS services with KMS (Access controls, IAM, etc): https://docs.aws.amazon.com/kms/latest/developerguide/control-access.html

Custom key store: https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html

AWS
Dan_H
con risposta 2 anni fa
  • Thanks a lot for the quick response. Is it mandatory to use CloudHSM as a custom Key store in order to use it with most AWS services? I have been asked to research CloudHSM only. Can you use CloudHSM on its own? If so, will it work with all AWS services, and how do the services actually connect to CloudHSM?

  • Can you explain why you wouldn't want to use KMS, while using AWS services? That may help with designing a solution.

    You can integrate CloudHSM with many third party secret managers as well: https://docs.aws.amazon.com/cloudhsm/latest/userguide/other-integrations.html

    I am not aware of AWS services integrating directly with CloudHSM, except by one hopping via KMS.

0

Thanks Dan. I am writing a knowledge base article on CloudHSM at work and want to leave KMS out of the article if I can. I was under the impression that you could use CloudHSM on its own without going the KMS route and using custom key store. Theoretically, can you use CloudHSM without Custom Key store, and if so, how do AWS IAM and the crypto users work together to carry out cryptographic functions in your AWS account?

con risposta 2 anni fa

Accesso non effettuato. Accedi per postare una risposta.

Una buona risposta soddisfa chiaramente la domanda, fornisce un feedback costruttivo e incoraggia la crescita professionale del richiedente.

Linee guida per rispondere alle domande