[Announcement] AWS IoT Greengrass v2 now supports the use of hardware security modules (HSM)

0

We are pleased to announce that AWS IoT Greengrass v2 now supports the use of hardware security modules (HSM) through the PKCS#11 interface for secure storage and offloading of private keys. Customers can use the new PKCS#11 provider component to securely store and access private keys in HSMs, such as Trusted Platform Modules (TPM), or other cryptographic elements. AWS IoT Device Tester for AWS IoT Greengrass (IDT-GG) now also includes tests for device manufacturers to validate if their devices with Trusted Platform Modules (TPM) can run AWS IoT Greengrass and interoperate with AWS IoT services.
Managing the security of device fleets is a top priority for IoT customers, specially those with devices that are installed either outside company premises or in remote, unmanned areas. With this launch, you can configure AWS IoT Greengrass Core software to use the private key and certificate stored in a hardware security module (HSM) through the PKCS#11 interface (https://en.wikipedia.org/wiki/PKCS_11). To enable the AWS IoT Greengrass Core software to use the private key and certificate stored in the HSM, you can install and configure the PKCS#11 provider component when you install the AWS IoT Greengrass Core software.
AWS IoT Device Tester for AWS IoT Greengrass (IDT-GG) is a test automation tool for your Greengrass devices. IDT-GG now includes tests for device manufacturers to validate if their devices with Trusted Platform Modules (TPM) can run AWS IoT Greengrass and interoperate with AWS IoT services.
To learn more, refer to AWS IoT Greengrass developer guide (https://docs.aws.amazon.com/greengrass/v2/developerguide/hardware-security.html) and AWS IoT Device Tester for AWS IoT Greengrass developer guide (https://docs.aws.amazon.com/greengrass/v2/developerguide/dev-test-versions.html).

  • This is an announcement migrated from AWS Forums that does not require an answer

  • is there any example of how to configure on using the pkcs11 private key ? We are using the ATECC608A from microchip and for purposes of retrieving the private key we specify it like:

    pkcs11:model=ATECC608A;manufacturer=Microchip Technology Inc;serial=1234567890334;token=00ABC;object=device;type=private

    so i assume this should be configured somewhere in the /greengrass/v2/config/effectiveConfig.yaml ?

AWS
질문됨 2년 전112회 조회
답변 없음

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인