AWS CloudHSM のアイコン

AWS CloudHSM Specialized2013年〜

A service for managing encryption keys using dedicated hardware security modules

What It Does

AWS CloudHSM provides dedicated Hardware Security Modules (HSMs) within the AWS cloud for generating, storing, and managing encryption keys. HSMs are tamper-resistant dedicated hardware designed to prevent keys from being leaked externally. Certified at FIPS 140-2 Level 3, CloudHSM meets the strict security standards required by financial institutions and government agencies.

Use Cases

CloudHSM is used in scenarios requiring high security standards, such as encrypting payment data at financial institutions, managing SSL/TLS certificate private keys, and managing keys for database Transparent Data Encryption (TDE). It is also adopted in industries where regulations mandate HSM usage, such as credit card processing requiring PCI DSS compliance.

Everyday Analogy

Think of it like a bank safe deposit box. A regular safe (software-based encryption) can protect valuables, but a bank safe deposit box (HSM) is physically reinforced and has mechanisms that automatically destroy contents if someone tries to break in. CloudHSM makes this bank-grade safe deposit box available in the cloud.

What Is CloudHSM?

AWS CloudHSM is a service that securely manages encryption keys using dedicated hardware. An HSM (Hardware Security Module) is a specialized hardware device for cryptographic processing that handles key generation, storage, and encryption entirely within the hardware. Unlike software-based key management, keys are never exposed in plaintext in memory, achieving extremely high security.

Differences from KMS

AWS also offers KMS (Key Management Service) for managing encryption keys. While KMS is fully managed and easy to use, CloudHSM gives users dedicated HSMs with complete control over their keys. With KMS, AWS manages key backups and availability, but with CloudHSM, users manage cluster configuration and backups themselves. Choose CloudHSM when regulations require a dedicated HSM or when you need standard interfaces like PKCS#11 or JCE.

Cluster Configuration and Availability

CloudHSM operates in a cluster configuration. By placing HSM instances across multiple Availability Zones, you can ensure high availability. HSMs within a cluster automatically synchronize keys, so if one HSM fails, others can continue processing. For production environments, it is recommended to deploy at least two HSMs in different Availability Zones. For a deeper understanding of cluster configuration and availability, check out related books on Amazon.

Getting Started

To start using CloudHSM, create a cluster in the CloudHSM console and specify a VPC and subnets. Add HSM instances to the cluster and perform initialization. Next, install the CloudHSM client software on an EC2 instance and connect to the HSM. Create a Crypto User to begin generating and managing keys.

Things to Watch Out For

  • CloudHSM is billed hourly at approximately $1.50/hour per HSM. It is significantly more expensive than KMS, so consider KMS if you don't have regulatory requirements
  • Losing the HSM administrator password means losing access to your keys. Establish secure password storage and recovery procedures in advance
  • CloudHSM clusters are deployed within a VPC, so the connecting EC2 instance must be in the same VPC or have a peering connection
共有するXB!