top | item 5447858

AWS CloudHSM: Secure Key Storage and Cryptographic Operations

37 points| jcase | 13 years ago |aws.amazon.com

10 comments

order

geertj|13 years ago

What is the threat model here?

My assumption is that the cryptographic keys will not be able to leave the HSM. This means that the HSM itself will need to perform cryptographic operations. You send it your data (e.g. a blob to decrypt), and the HSM will decrypt it for you using its embedded keys. Similarly it would implement other cryptographic primitives. To unlock the device to perform cryptographic operations, presumably some kind of pass phrase is required. That pass phrase would need to be online for applications to work in an unattended way. Either in memory or on disk.

So it would seem this would protect against someone stealing your data surreptitiously. The only way to decrypt that data is via the HSM, and presumably the HSM has untamperable access logs. Suppose data is stolen. Then after fixing the attack vector and making sure your systems are trustable again, you'd change the HSM pass phrase, and make sure there are no unexpected entries in the HSM audit log. At that point you can consider your private data to be safe again.

However it seems that an active attack is still possible. If an attacker gets into an EC2 instance with HSM encrypted data and an online pass phrase, he can just use the HSM to decrypt that data. Unless you watch your HSM audit logs really closely, the attacker could have stolen your data before you even notice.

Also it would still be possible for a govt. agency to seize the HSM and the instance with an online passphrase. So this would do little for EU companies that cannot legally have their data become in scope for the PATRIOT act.

[Edit: spelling]

Nrsolis|13 years ago

This is more likely to appeal to organizations that have strict requirements for SSL certificates. So the HSMs in this instance would protect the SSL private keys for certain industries that must maintain strong guarantees that an attacker could not impersonate them.

The threat here is the loss of the private key that proves trusted identity, not data loss prevention.

toomuchtodo|13 years ago

I don't see the benefit of having an HSM device in a multi-tenant environment. Great! My keys are safe! Now what's going to protect my data when there's a vulnerability in the dom0/hypervisor?

hamburglar|13 years ago

Am I missing some actual numbers hiding somewhere in the "pricing" section? "There will be a one-time fee plus an hourly fee" is not pricing information.

borski|13 years ago

Looks like $5000 upfront and $1.88/hr.