When you use an HSM from AWS CloudHSM, you can perform a variety of cryptographic tasks:
Generate, store, import, export, and , including symmetric keys and asymmetric key pairs.
Use symmetric and asymmetric algorithms to .
Use cryptographic hash functions to (HMACs).
Cryptographically.
Generate cryptographically.
User Cases
Offloading reduces the computational burden on your web server and provides extra security by storing the server's private key in the HSMs.
Protect the Private Keys for an Issuing Certificate Authority (CA),store the private key in the HSM in your AWS CloudHSM cluster, and use the HSM to perform the cryptographic signing operations.
Some versions of Oracle's database software offer a feature called Transparent Data Encryption (TDE). You can store the TDE master encryption key in the HSMs in your AWS CloudHSM cluster, which provides additional security.
AWS CloudHSM Clusters
AWS CloudHSM provides hardware security modules (HSMs) in acluster.
A cluster is that AWS CloudHSM .
You can create a cluster that has from (thedefault limitis 6 HSMs per AWS account per AWS Region)
You can place the HSMs in in an AWS Region.
Adding to a cluster provides .
provides.
When you create a cluster, you specify an (VPC) in your AWS account and .
When you create an AWS CloudHSM cluster with more than one HSM, you.
AWS CloudHSM makes of the users, keys, and policies in the cluster. The service stores backups in a service-controlled Amazon Simple Storage Service (Amazon S3) bucket in the same region as your cluster.
When AWS CloudHSM makes a backup from the HSM, the HSM . The data never leaves the HSM in plaintext form.
Managing HSM Users and Keys
Unlike most AWS services and resources, you (IAM) users or IAM policies to access resources within your cluster.
Instead, you on the hardware security module (HSM) with AWS CloudHSM.
Before you can use your AWS CloudHSM cluster for cryptoprocessing, you muston the HSMs in your cluster.
The HSM authenticates each HSM user and each HSM user has a on the HSM as that user.
Crypto Officer (CO | PCO)
A crypto officer (CO) can perform user management operations.
PCO is the designation for first CO you create, the primary CO.