What AWS cryptographic service is used to create and maintain Hardware Security Modules (HSMs) in the AWS environment?
AWS CloudHSM (single-tenant, AWS-provisioned, fully customer-managed HSMs)
What computing devices process cryptographic operations and provide secure storage for cryptographic keys?
Hardware Security Modules (HSMs)
How do AWS CloudHSM and AWS KMS differ in FIPS 140-2 compliance? A:
How can AWS CloudHSM be accessed?
AWS KMS operations are performed via the AWS Standard API
Can AWS CloudHSM be deployed into the customer VPC?
No, CloudHSM is deployed into a separate AWS-managed VPC, HSM instances are exposed to the customer VPC via network interfaces
Is AWS CloudHSM highly available by default?
No, requires at least two deployments in each Availability Zones for High Availability
How can EC2 instances access AWS CloudHSM?
Via the CloudHSM client installed on the EC2 instances
Can AWS access the secure HSM area where key material is stored?
No, AWS provisions CloudHSM but has no access to the HSM secure area
Can AWS KMS integrate with AWS CloudHSM?
Yes, AWS KMS can use CloudHSM as a custom key store
When would AWS CloudHSM be an appropriate choice?
When requirements include:
- Single-tenant Hardware Security Module
- FIPS 140-2 Level 3 overall compliance
- Access via industry-standard APIs (PKCS#11, JCE, CNG)
What are the main use cases for AWS CloudHSM service?
AWS CloudHSM is commonly used for:
- Implementing client-side encryption
- Offloading SSL/TLS processing from web servers
- Enabling Transparent Data Encryption (TDE) for databases such as Oracle
- Protecting the private key of an issuing Certificate Authority (CA)