AWS Cloud Key Management integration and key operations
This section explains how to create a new HSM Protected key group on the KMES and how the different key operations work for pushing keys to AWS KMS.
If you have a firewall in your environment, ensure that it allows the *.amazonaws.com:443 endpoint to pass from the KMES to the internet. If you need a more specific endpoint, refer to the following documentation: https://docs.aws.amazon.com/general/latest/gr/kms.html
Key groups act as both a container for keys and a template for creating keys within the key group, enabling you to define various key HSM Protected attributes, such as the type of key, the key rotation schedule, and the service to use (such as Amazon Web Services).
Perform the following steps to create an HSM Protected key group:
Log in to the KMES Series 3 application interface by using the default admin identities.
Go to Key Management > Keys.
Right-click the Key Group background, select Add > Key Group, and select the following options:
Option
Required configuration
Key Type
Symmetric.
Storage Location
HSM Protected.
The AWS KMS integration does not support asymmetric keys.
Select [ OK ] to continue.
In the next window, set up the parameters for the key group. On the Group tab, make the following changes:
Option
Required configuration
Name
Choose a descriptive name.
Service
Amazon Web Services.
Credential
Select [ Select ] and choose the credential you created from the CSV.
Key Type
AES.
Key Length
AES-256.
Key Usage
Encrypt + Decrypt.
Rotate Key
Leave box checked if you want the key group to rotate keys on a schedule.
Rotate Every
Set the desired rotation interval.
Keep key valid for
Set the length of time that keys created in the key group should remain valid.
Do not change the Info tab default settings.
In the AWS Properties tab, make the following changes:
Option
Required configuration
Alias
Choose a nickname.
Description
Optional.
Region
Select the AWS region where you created the KMS key.
Active Key ID
Enter the Key ID formatted as xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
Policy
Select [ Import Policy ] and then select the policy that you saved as a JSON file. The policy specifies the permissions for accessing the customer master key in AWS.
Disable key after rotating
Optional.
Select [ OK ] to finish creating the HSM Protected Key Group.
You can perform the following operations on keys that are part of an AWS HSM Protected key group:
Operation
Description
Rotate an HSM Protected Key Group
This forces you to generate a new key on the KMES and then upload it to AWS with the alias configured under the AWS Properties tab assigned to the key. On the Customer managed keys page in AWS KMS, you can see that the old key ID loses the alias when rotated, and the most recently created key receives the alias.
Synchronize an HSM Protected key
This updates the given key ID in AWS with the selected key. For example, you can delete the key material from AWS for a key. Then, you can right-click that same key in the KMES, synchronize it, and re-add the key material. You can also delete key material from AWS by checking the appropriate check box when synchronizing in the KMES.
For this integration, the only way that you should keys inside an AWS HSM Protected Key Group is by force rotating the key group or simply waiting for a key rotation to occur based on the configured rotation schedule.
The following process demonstrates how to force rotate the HSM Protected key group to generate and push the first key to AWS KMS:
Make sure to set the KMES as the designated device for rotating key material (under Administration > Configuration > HSM Protected Key Options).
Go to Key Management > Keys.
Right-click on the HSM Protected key group that you created in the previous section, and select Cloud > Force Rotate.
A job runs to rotate and synchronize this key to the AWS KMS account specified for the key group. To monitor job progress, go to Logging and Reporting > Jobs and double-click on the Rotate HSM protected keys job that just began.
If the synchronization succeeds, a message similar to the following displays:
After the job finishes, go to Key Management > Keys and select the key group of the key you just synchronized. Notice that the key now displays under the key group.
You can also see the key in AWS KMS under Customer managed keys, with the alias that you configured on the AWS Properties tab for the key group.
Right-click the AWS HSM Protected key group again and select Cloud > Force Rotate. The newly generated key displays along with the first key generated in the key group.
In AWS, this new key is assigned the alias configured for the HSM Protected key group, and the previously active KEY ID loses the alias.
Synchronizing a key means synchronizing or deleting key material for any of the previously active Key IDs. The following process demonstrates how to synchronize an HSM Protected key:
Select the AWS HSM Protected key group.
Right-click one of the previously active key IDs and select Cloud > Synchronize.
Select one of the following actions:
- Delete Key Material
- Update Policy (selected by default)
- Import Key Material (selected by default)
You should import key material only if the key material had been deleted for the associated Key ID previously, either in AWS KMS or through the Delete Key Material option.
A new job executes and displays on the Logging and Reporting > Jobs page, where you can track the progress of the operation.