Amazon KMS: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
(6 intermediate revisions by the same user not shown) | |||
Line 9: | Line 9: | ||
* [[Amazon AWS#Subjects|Amazon AWS]] | * [[Amazon AWS#Subjects|Amazon AWS]] | ||
* [[Amazon Encryption SDK]] | |||
=TODO= | =TODO= | ||
Line 14: | Line 15: | ||
<font color=darkgray> | <font color=darkgray> | ||
Amazon KMS in Learning/Workarea. | Amazon KMS in Learning/Workarea. | ||
https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf | |||
</font> | </font> | ||
Line 20: | Line 23: | ||
Amazon Key Management Service (KMS) is a service provided in the AWS ecosystem for encryption key management. It is backed by Hardware Security Modules (HSM) for physical security. KMS is focused on securely storing encryption keys and supporting cryptographic operations (encrypt and decrypt) using those keys. | Amazon Key Management Service (KMS) is a service provided in the AWS ecosystem for encryption key management. It is backed by Hardware Security Modules (HSM) for physical security. KMS is focused on securely storing encryption keys and supporting cryptographic operations (encrypt and decrypt) using those keys. | ||
= | =Subjects= | ||
* <span id='Amazon_KMS_Concepts'></span>[[Amazon KMS Concepts|Concepts]] | |||
* <span id='AWS_KMS_API'></span>[[AWS KMS API]] | |||
* [[Amazon KMS Operations|Operations]] |
Latest revision as of 00:09, 27 April 2019
External
- https://aws.amazon.com/kms/
- https://docs.aws.amazon.com/kms/latest/developerguide/overview.html
- https://docs.aws.amazon.com/kms/latest/APIReference/Welcome.html
- https://www.vaultproject.io/intro/vs/kms.html
Internal
TODO
Amazon KMS in Learning/Workarea.
https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf
Overview
Amazon Key Management Service (KMS) is a service provided in the AWS ecosystem for encryption key management. It is backed by Hardware Security Modules (HSM) for physical security. KMS is focused on securely storing encryption keys and supporting cryptographic operations (encrypt and decrypt) using those keys.