AWS KMS Flashcards

1
Q

KMS arch

A

Part of AWS public zone and exists as a separate service in each region

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

KMS is used

A

To create, store and manage cryptography keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptographic Operations

A

Can handle Symmetric and Asymmetric Keys
Cryptographic operations for encrypting, decrypting, and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where does the Keys in KMS stay ?

A

Keys never leave the KMS Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

KMS Security Level compliance standard

A

Security Standards compliance : FIPS 140-2 (L2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

KMS mainly manages

A

CMK (Customer Master Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

KMS contains

A

Physical master keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Two types of CMK

A

AWS-Managed
Created automatically when you enable server-side encryption of a resource

Customer-Managed.
Created by you when necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CMKs Rotation

A

CMKs support rotation
Process when the physical material is changed.
For AWS-managed CMK the rotation happens once every 3 years
For Customer-managed CMK rotation is optional but once enabled, it is an annual change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CMK’s are made of

A

ID
Date
Policy
Description
State (active or not).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Aliases

A

Allow creation alias at the region that points to a CMK and your application can use that alias instead of the direct CMK name.
This allows you to change the CMK without changing the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Key Policies

A

Resource policy for keys and revert CMK has its Key Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IAM users and KMS

A

User needs: Key Policy + IAM Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Encryption Key (DEK)

A

Type of key that KMS generates using a CMK
GenerateDateKey operation generate keys (DEK) that work for bigger than 4KB

KMS never stores the DEK, it provides to you and discards it because it does not use it, you are responsible to use DEK to encrypt and decrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encry/Decry

A

To encrypt data outside of KMS: Generate the plain data key and ciphertext version of the keys using the GenerateDataKey Operation, use the plain key to encrypt the data and discard it, and store the encrypted key with the data.

To decrypt data outside KMS: Get the encrypted key and use the decrypt operation of KMS to receive the plaintext of the key, use the plaintext data key to decrypt the data and discard it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

KMS Scope

A

Region
Keys are isolated to a region and never leave the KMS Service.