KMS uses hierarchical encryption for data key, master key and root key, thereby ensuring secure key management. The master key is created through the root key stored in the FIPS 140-2 Level 3 certified Hardware Security Module(HSM) and distributed and stored in the KMS for secure protection. Using the mater key, users create a data key for data encryption.
Key rotation enables the creation of new encrypted data for a given master key and allows users to define the frequency of key rotation based on user policy. In addition, managing usage logs become easy with KMS monitoring. By administrating the lifecycle of encryption keys, one can also delete or reactivate disabled keys to protect data against cryptographic threats.
Using a high availability infrastructure, KMS delivers a reliable service. KMS provides high availability with multiplexing configurations such as the KMS engine that creates master key and the HSM that stores root key.
KMS is KMIP*-compliant and it creates and stores encryption key that can be used in other KMIP-compliant applications.
* Key Management Interoperability Protocol : A comprehensive protocol for standard key management, governed by OASIS whose goal is to maintain operability between different encryption services and unifies key management operations.
Whether you’re looking for a specific business solution or just need some questions answered, we’re here to help