资讯详情

57. AWS CloudHSM

Overview

  • AWS CloudHSM provides in the AWS Cloud.
  • A hardware security module (HSM) is a.
  • When you use an HSM from AWS CloudHSM, you can perform a variety of cryptographic tasks:
    • Generate, store, import, export, and , including symmetric keys and asymmetric key pairs.
    • Use symmetric and asymmetric algorithms to .
    • Use cryptographic hash functions to (HMACs).
    • Cryptographically.
    • Generate cryptographically.

User Cases

  • Offloading reduces the computational burden on your web server and provides extra security by storing the server's private key in the HSMs.
  • Protect the Private Keys for an Issuing Certificate Authority (CA),store the private key in the HSM in your AWS CloudHSM cluster, and use the HSM to perform the cryptographic signing operations.
  • Some versions of Oracle's database software offer a feature called Transparent Data Encryption (TDE). You can store the TDE master encryption key in the HSMs in your AWS CloudHSM cluster, which provides additional security.

AWS CloudHSM Clusters

  • AWS CloudHSM provides hardware security modules (HSMs) in acluster.
  • A cluster is that AWS CloudHSM .
  • You can create a cluster that has from (thedefault limitis 6 HSMs per AWS account per AWS Region)
  • You can place the HSMs in in an AWS Region.
  • Adding to a cluster provides .
  • provides.
  • When you create a cluster, you specify an (VPC) in your AWS account and .
  • When you create an AWS CloudHSM cluster with more than one HSM, you.
  • AWS CloudHSM makes of the users, keys, and policies in the cluster. The service stores backups in a service-controlled Amazon Simple Storage Service (Amazon S3) bucket in the same region as your cluster.
  • When AWS CloudHSM makes a backup from the HSM, the HSM . The data never leaves the HSM in plaintext form.

Managing HSM Users and Keys

  • Unlike most AWS services and resources, you (IAM) users or IAM policies to access resources within your cluster.
  • Instead, you on the hardware security module (HSM) with AWS CloudHSM.
  • Before you can use your AWS CloudHSM cluster for cryptoprocessing, you muston the HSMs in your cluster.
  • The HSM authenticates each HSM user and each HSM user has a on the HSM as that user.

标签: hsm数显温度变送器

锐单商城拥有海量元器件数据手册IC替代型号,打造 电子元器件IC百科大全!

锐单商城 - 一站式电子元器件采购平台