How cloudHSM encrypt and decrypt files?

0

Hi all! I would like to ask a question about cloudhsm

I am currently testing the possibility of using cloudhsm to encrypt data in S3 with my encryption keys and due to compliance reasons I chose cloudhsm

when I initialize the cloudhsm cluster, I get the CSR and sign it in the certification authority of our organization, and I get the root CA public key (CA-public-key.crt ) and the certificate signed by our CA ( cluster-certificate.crt )

then I initialize the cluster with the command

aws cloudhsmv2 initialize-cluster --cluster-id cluster-klgfnjklsng
--signed-cert file://cluster-certificate.crt
--trust-anchor file://CA-public-key.crt

then in KMS I set up an external key store ( CloudHSM ) and initialize it with CA-public-key.crt

and after that I create an S3 bucket where I choose encryption KMS and thus the data is encrypted

but I have a question, how does AWS encrypt my data in the cloud? after all, during initialization, I did not transfer the private key of our CA, but as we know, with asymmetric encryption, the file can be encrypted using the public key and decrypted using the private key! how does AWS decrypt files on the fly since I didn't pass the private key to CloudHSM when I initialized the cluster?

1 回答
0

Hello,

The steps mentioned in initialization of cluster like Get the cluster CSR , Sign the CSR are for verifying the identity of the cluster for security reason. Those keys are NOT used for encrypt/decrypt files in S3.

You need to create new symmetric keys in KMS custom key store using https://docs.aws.amazon.com/kms/latest/developerguide/create-cmk-keystore.html#create-cmk-keystore-console Also AWS CloudHSM key stores support only symmetric encryption KMS keys.

If you are concerned about KMS FIPS compliance then recently AWS KMS HSMs upgraded to FIPS 140-2 Security Level 3 https://aws.amazon.com/about-aws/whats-new/2023/05/aws-kms-hsm-fips-security-level-3/

Thanks

AWS
已回答 1 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则