CloudHSM Flashcards

This deck aims to help retain concepts related to the AWS CloudHSM service. (11 cards)

1
Q

What AWS cryptographic service is used to create and maintain Hardware Security Modules (HSMs) in the AWS environment?

A

AWS CloudHSM (single-tenant, AWS-provisioned, fully customer-managed HSMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What computing devices process cryptographic operations and provide secure storage for cryptographic keys?

A

Hardware Security Modules (HSMs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do AWS CloudHSM and AWS KMS differ in FIPS 140-2 compliance? A:

A
  • CloudHSM: FIPS 140-2 Level 3 compliant (overall)
  • KMS - FIPS 140-2 Level 2 (overall)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can AWS CloudHSM be accessed?

A
  • Industry-standard cryptographic APIs PKCS#11
  • Java Cryptography Extension (JCE)
  • Microsoft CryptoNG (CNG)

AWS KMS operations are performed via the AWS Standard API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can AWS CloudHSM be deployed into the customer VPC?

A

No, CloudHSM is deployed into a separate AWS-managed VPC, HSM instances are exposed to the customer VPC via network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is AWS CloudHSM highly available by default?

A

No, requires at least two deployments in each Availability Zones for High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can EC2 instances access AWS CloudHSM?

A

Via the CloudHSM client installed on the EC2 instances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can AWS access the secure HSM area where key material is stored?

A

No, AWS provisions CloudHSM but has no access to the HSM secure area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can AWS KMS integrate with AWS CloudHSM?

A

Yes, AWS KMS can use CloudHSM as a custom key store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When would AWS CloudHSM be an appropriate choice?

A

When requirements include:
- Single-tenant Hardware Security Module
- FIPS 140-2 Level 3 overall compliance
- Access via industry-standard APIs (PKCS#11, JCE, CNG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the main use cases for AWS CloudHSM service?

A

AWS CloudHSM is commonly used for:
- Implementing client-side encryption
- Offloading SSL/TLS processing from web servers
- Enabling Transparent Data Encryption (TDE) for databases such as Oracle
- Protecting the private key of an issuing Certificate Authority (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly