Amazon KMS: Difference between revisions
Jump to navigation
Jump to search
(14 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
=External= | |||
* https://aws.amazon.com/kms/ | |||
* https://docs.aws.amazon.com/kms/latest/developerguide/overview.html | |||
* https://docs.aws.amazon.com/kms/latest/APIReference/Welcome.html | |||
* https://www.vaultproject.io/intro/vs/kms.html | |||
=Internal= | =Internal= | ||
* [[Amazon AWS#Subjects|Amazon AWS]] | * [[Amazon AWS#Subjects|Amazon AWS]] | ||
* [[Amazon Encryption SDK]] | |||
=TODO= | |||
<font color=darkgray> | |||
Amazon KMS in Learning/Workarea. | |||
https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf | |||
</font> | |||
=Overview= | =Overview= | ||
Amazon Key Management Service (KMS) is a service provided in the AWS ecosystem for encryption key management. It is backed by Hardware Security Modules (HSM) for physical security. | Amazon Key Management Service (KMS) is a service provided in the AWS ecosystem for encryption key management. It is backed by Hardware Security Modules (HSM) for physical security. KMS is focused on securely storing encryption keys and supporting cryptographic operations (encrypt and decrypt) using those keys. | ||
=Subjects= | |||
* <span id='Amazon_KMS_Concepts'></span>[[Amazon KMS Concepts|Concepts]] | |||
* <span id='AWS_KMS_API'></span>[[AWS KMS API]] | |||
* [[Amazon KMS Operations|Operations]] |
Latest revision as of 00:09, 27 April 2019
External
- https://aws.amazon.com/kms/
- https://docs.aws.amazon.com/kms/latest/developerguide/overview.html
- https://docs.aws.amazon.com/kms/latest/APIReference/Welcome.html
- https://www.vaultproject.io/intro/vs/kms.html
Internal
TODO
Amazon KMS in Learning/Workarea.
https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf
Overview
Amazon Key Management Service (KMS) is a service provided in the AWS ecosystem for encryption key management. It is backed by Hardware Security Modules (HSM) for physical security. KMS is focused on securely storing encryption keys and supporting cryptographic operations (encrypt and decrypt) using those keys.