AWS CloudHSM | Security Flashcards

1
Q

Is there an SLA for CloudHSM?

Security

AWS CloudHSM | Security, Identity & Compliance

A

At the present time, there is no SLA for CloudHSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Do I share my CloudHSM with other AWS customers?

Security

AWS CloudHSM | Security, Identity & Compliance

A

No. As part of the service you receive single-tenant access to the HSM. Underlying hardware may be shared with other customers, but the HSM is accessible only to you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does AWS manage the HSM without having access to my encryption keys?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Separation of duties and role-based access control is inherent in the design of CloudHSM. AWS has a limited credential to the HSM that permits us to monitor and maintain the health and availability of the HSM, take encrypted backups, and to extract and publish audit logs to your CloudWatch Logs. AWS is unable to see, access or use your keys, or cause your HSM to perform any cryptographic operation using your keys.

Please see the CloudHSM User Guide for more information on the separation of duties, and the capabilities each class of user has on the HSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can I monitor my HSM?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Yes. CloudHSM publishes multiple CloudWatch metrics for CloudHSM Clusters and for individual HSM instances. You can use the AWS CloudWatch Console, API or SDK to obtain or alarm on these metrics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ‘entropy source’ (source of randomness) for CloudHSM?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Each HSM has a FIPS-validated Deterministic Random Bit Generator (DRBG) that is seeded by a True Random Number Generator (TRNG) within the HSM hardware module that conforms to SP800-90B. This is a high-quality entropy source capable of producing 20Mb/sec of entropy per HSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if someone tampers with the HSM hardware?

Security

AWS CloudHSM | Security, Identity & Compliance

A

CloudHSM has both physical and logical tamper detection and response mechanisms that trigger key deletion (zeroization) of the hardware. The hardware is designed to detect tampering if its physical barrier is breached. HSM instances are also protected against brute-force login attacks. After a fixed number of unsuccessful attempts to access an HSM with Crypto Officer (CO) credentials, the HSM instance will zeroise itself. After a fixed number of unsuccessful attempts to access an HSM with Crypto User (CU) credentials, the user will be locked and must be unlocked by a CO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens in case of failure?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Amazon monitors and maintains the HSM and network for availability and error conditions. If an HSM fails or loses network connectivity, the HSM will be automatically replaced. You can check the health of an individual HSM using the CloudHSM API, SDK, or CLI Tools, and you can check the overall health of the service at any time using the AWS Service Health Dashboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Could I lose my keys if a single HSM instance fails?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Yes. It is possible to lose keys that were created since the most recent daily backup if the CloudHSM cluster that you are using fails and you are not using two or more HSMs. Amazon strongly recommends that you use two or more HSMs, in separate Availability Zones, in any production CloudHSM Cluster to avoid loss of cryptographic keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can Amazon recover my keys if I lose my credentials to my HSM?

Security

AWS CloudHSM | Security, Identity & Compliance

A

No. Amazon does not have access to your keys or credentials and therefore has no way to recover your keys if you lose your credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do I know that I can trust CloudHSM?

Security

AWS CloudHSM | Security, Identity & Compliance

A

CloudHSM is built on hardware that is validated at Federal Information Processing Standard (FIPS) 140-2 Level 3. You can find the FIPS 140-2 Security Profile for the hardware used by CloudHSM here: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2850.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Does the CloudHSM service support FIPS 140-2 Level 3?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Yes, CloudHSM provides FIPS 140-2 Level 3 validated HSMs. You can follow the procedure in the CloudHSM User Guide under Verify the Authenticity of Your HSM to confirm that you have an authentic HSM on the same model hardware specified in the NIST Security Policy described in the previous question.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do I operate a CloudHSM in FIPS 140-2 mode?

Security

AWS CloudHSM | Security, Identity & Compliance

A

CloudHSM is always in FIPS 140-2 mode. This can be verified by using the CLI tools as documented in the CloudHSM User Guide and running the getHsmInfo command, which will indicate the FIPS mode status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can I securely distribute an HSM partition credential to my instances?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Please refer to the following AWS Security Blog post which describes Using IAM roles to distribute non-AWS credentials to your EC2 instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can I get a history of all CloudHSM API calls made from my account?

Security

AWS CloudHSM | Security, Identity & Compliance

A

Yes. AWS CloudTrail records AWS API calls for your account. The AWS API call history produced by CloudTrail lets you perform security analysis, resource change tracking, and compliance auditing. Learn more about CloudTrail at the CloudTrail home page, and turn it on via CloudTrail’s AWS Management Console.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly