AWS KMS
AWS KEY MANAGEMENT SERVICE
AWS KMS
AWS Key Management Service gives you centralized
control over the encryption keys used to protect your
data
You can create, rotate, disable, define usage policies
for, and audit the use of encryption keys used to
encrypt your data
AWS Key Management Service is integrated with
Amazon S3, Amazon EBS, Amazon RDS, Amazon
Redshift, Amazon Elastic Transcoder and Amazon
WorkMail
AWS KMS
AWS KMS is integrated with AWS CloudTrail which
provides you the ability to audit who used which
keys, on which resources, and when
AWS KMS enables developers to easily encrypt data,
whether through 1-click encryption in the AWS
Management Console, or using the AWS SDK to
easily add encryption in their application code
AWS KMS Features
Create keys with a unique alias and description
Define which IAM users and roles can manage keys
Define which IAM users and roles can use keys to encrypt
and decrypt data
Choose to have AWS KMS automatically rotate your keys
on an annual basis
Temporarily disable keys so they cannot be used by
anyone
Re-enable disabled keys
Audit use of keys by inspecting logs in AWS CloudTrail
How KMS Works
AWS KMS allows you to centrally manage and securely
store your keys.
These keys can be used from within your applications
and supported AWS cloud services to protect your data,
but the key never leaves KMS AWS.
You submit data to AWS KMS to be encrypted, or
decrypted, under keys that you control.
You set usage policies on these keys that determine
which users can use them to encrypt and decrypt data.
All requests to use these keys are logged in AWS
CloudTrail so you can understand who used which key
when
AWS KMS
You can use AWS KMS to help encrypt data locally in
your own applications or have it encrypted within a
supported AWS cloud service
AWS Services Integrated with KMS
Amazon Elastic Block Store (EBS)
Amazon Simple Storage Service (S3)
Amazon RDS
Amazon Redshift
Amazon Elastic Transcoder
Amazon WorkMail
Amazon EMR
AWS KMS
With AWS KMS you can:
Create, describe, and list keys
Enable and disable keys
Set and retrieve key usage policies
Create, delete, list, and update key aliases
AWS KMS
With AWS KMS you can also perform the following
cryptographic functions using keys:
Encrypt, decrypt, and re-encrypt data
Generate data keys that can be exported from the service in
plaintext or which can be encrypted under a key that doesn't
leave the service
Generate random numbers suitable for cryptographic
applications