Alibaba Cloud Key Management Service
Alibaba Cloud Key Management Service
Product Introduction
Issue: 20200703
Key Management Service Product Introduction / Legal disclaimer
Legal disclaimer
Alibaba Cloud reminds you to carefully read and fully understand the terms and conditions
of this legal disclaimer before you read or use this document. If you have read or used this
document, it shall be deemed as your total acceptance of this legal disclaimer.
1. You shall download and obtain this document from the Alibaba Cloud website or other
Alibaba Cloud-authorized channels, and use this document for your own legal business
activities only. The content of this document is considered confidential information of
Alibaba Cloud. You shall strictly abide by the confidentiality obligations. No part of this
document shall be disclosed or provided to any third party for use without the prior
written consent of Alibaba Cloud.
3. The content of this document may be changed due to product version upgrades,
adjustments, or other reasons. Alibaba Cloud reserves the right to modify the content
of this document without notice and the updated versions of this document will be
occasionally released through Alibaba Cloud-authorized channels. You shall pay
attention to the version changes of this document as they occur and download and
obtain the most up-to-date version of this document from Alibaba Cloud-authorized
channels.
4. This document serves only as a reference guide for your use of Alibaba Cloud products
and services. Alibaba Cloud provides the document in the context that Alibaba Cloud
products and services are provided on an "as is", "with all faults" and "as available"
basis. Alibaba Cloud makes every effort to provide relevant operational guidance based
on existing technologies. However, Alibaba Cloud hereby makes a clear statement that it
in no way guarantees the accuracy, integrity, applicability, and reliability of the content
of this document, either explicitly or implicitly. Alibaba Cloud shall not bear any liability
for any errors or financial losses incurred by any organizations, companies, or individual
s arising from their download, use, or trust in this document. Alibaba Cloud shall not,
under any circumstances, bear responsibility for any indirect, consequential, exemplary
, incidental, special, or punitive damages, including lost profits arising from the use or
trust in this document, even if Alibaba Cloud has been notified of the possibility of such
a loss.
Issue: 20200703 I
Key Management Service Product Introduction / Legal disclaimer
5. By law, all the contents in Alibaba Cloud documents, including but not limited to
pictures, architecture design, page layout, and text description, are intellectual property
of Alibaba Cloud and/or its affiliates. This intellectual property includes, but is not
limited to, trademark rights, patent rights, copyrights, and trade secrets. No part of
this document shall be used, modified, reproduced, publicly transmitted, changed,
disseminated, distributed, or published without the prior written consent of Alibaba
Cloud and/or its affiliates. The names owned by Alibaba Cloud shall not be used,
published, or reproduced for marketing, advertising, promotion, or other purposes
without the prior written consent of Alibaba Cloud. The names owned by Alibaba Cloud
include, but are not limited to, "Alibaba Cloud", "Aliyun", "HiChina", and other brands
of Alibaba Cloud and/or its affiliates, which appear separately or in combination, as
well as the auxiliary signs and patterns of the preceding brands, or anything similar
to the company names, trade names, trademarks, product or service names, domain
names, patterns, logos, marks, signs, or special descriptions that third parties identify as
Alibaba Cloud and/or its affiliates.
6. Please contact Alibaba Cloud directly if you discover any errors in this document.
II Issue: 20200703
Key Management Service Product Introduction / Legal disclaimer
Document conventions
Style Description Example
> Closing angle brackets are used Click Settings > Network > Set
to indicate a multi-level menu network type.
cascade.
Courier font Courier font is used for commands. Run the cd /d C:/window
command to enter the Windows
system folder.
Issue: 20200703 I
Key Management Service Product Introduction / Document conventions
II Issue: 20200703
Key Management Service Product Introduction / Document conventions
Contents
Legal disclaimer......................................................................... I
Document conventions................................................................I
1 What is KMS?.......................................................................... 1
2 Benefits.................................................................................. 4
3 Scenarios................................................................................7
4 Terms................................................................................... 11
5 Limits................................................................................... 13
IV Issue: 20200703
Key Management Service Product Introduction / 1 What is KMS?
1 What is KMS?
Key Management Service (KMS) provides features such as key hosting and cryptographic
operations. KMS implements security practices such as key rotation and can be integrated
with other Alibaba Cloud services to encrypt user data managed by these services. KMS
frees you up from maintaining the security, integrity, and availability of your keys. You only
need to focus on data encryption, data decryption, and digital signature generation and
verification based on your business requirements.
Features
• BYOK
KMS supports Bring Your Own Key (BYOK). You can lease your own keys to KMS to
encrypt data on the cloud. This facilitates key management. The following types of keys
can be leased:
Note:
With secure key exchange algorithms used in KMS, keys imported to managed HSMs
in KMS cannot be exported by using any method. Operators or third parties are not
allowed to check the plaintext of keys. For more information, see #unique_5 and
#unique_6/unique_6_Connect_42_section_x1y_emf_972.
A CMK in KMS can have multiple key versions. Each version represents an independently
generated key and does not have any relation with other versions. KMS can
automatically rotate encryption keys. This helps you implement best security practices
and meet compliance audit requirements. For more information, see #unique_7 and
#unique_8.
Issue: 20200703 1
Key Management Service Product Introduction / 1 What is KMS?
KMS provides fully managed HSMs. You can host keys to HSMs, so that cryptographic
operations are implemented within HSMs to protect key security. HSMs in KMS meet the
compliance requirements for cryptographic security in different regions and markets. For
more information, see #unique_6 and #unique_9.
- KMS provides cryptographic API operations that are simpler than those for traditional
cryptographic modules or cryptographic software libraries. For more information, see
#unique_4/unique_4_Connect_42_section_bmq_3mj_3gb.
- Encryption keys in KMS support authenticated encryption with associated data (AEAD)
and protect data integrity by delivering additional authenticated data (AAD). For
more information, see #unique_10.
• CMK aliases
KMS allows you to create CMK aliases, which can facilitate CMK usage. For more
information, see #unique_11. For example, you can use CMK aliases to manually rotate
CMKs in specific scenarios. For more information, see #unique_12.
• Resource tags
Like other Alibaba Cloud services, KMS also supports resource tags. Resource tags
make it easier to manage key resources in KMS. For more information, see #unique_4/
unique_4_Connect_42_section_hb4_mmj_3gb.
Benefits
KMS is integrated with multiple Alibaba Cloud services. This significantly improves the
advantages of KMS. For more information, see Benefits.
• KMS is integrated with Elastic Compute Service (ECS), ApsaraDB for RDS, and Object
Storage Service (OSS). You can use CMKs in KMS to encrypt and control data stored in
these services and protect native data of these services.
• KMS is integrated with Resource Access Management (RAM). You can configure a variety
of custom policies by using RAM to meet requirements for different authorization
scenarios.
• KMS is integrated with ActionTrail. This allows you to view the recent KMS usage and
store the KMS usage information in other services such as OSS to meet audit requiremen
ts in the long term.
2 Issue: 20200703
Key Management Service Product Introduction / 1 What is KMS?
Related concepts
Benefits
Scenarios
Terms
Limits
Related topics
#unique_4
Issue: 20200703 3
Key Management Service Product Introduction / 2 Benefits
2 Benefits
Compared with key management infrastructure (KMI), Key Management Service (KMS)
features multi-service integration, ease of use, high reliability, and cost-effectiveness.
Multi-service integration
KMS authenticates the validity of requests by using AccessKey pairs. KMS is integrated
with Resource Access Management (RAM). This allows you to configure a variety of
custom policies to meet requirements in different authorization scenarios. Requests that
are initiated by valid users and pass attribute-based access control (ABAC) of RAM can
be accepted by KMS. For more information, see #unique_17.
KMS is integrated with ActionTrail. This allows you to view the recent KMS usage
and store the KMS usage information in other services such as OSS to meet audit
requirements in the long term. For more information, see #unique_18.
KMS is integrated with multiple Alibaba Cloud services such as ECS, ApsaraDB for
RDS, and OSS. You can easily use customer master keys (CMKs) in KMS to encrypt and
control the data stored in these services and maintain control over the cloud computing
and storage environments. You only need to pay for the service and do not need to
implement complex encryption capabilities. In addition, KMS also protects native data of
these services. For more information, see #unique_19 and #unique_20.
Ease of use
• Easy encryption
4 Issue: 20200703
Key Management Service Product Introduction / 2 Benefits
- You can create a new CMK at any time and use RAM to easily manage who can access
the CMK.
- You can import keys to KMS from KMI or from HSMs of Data Encryption Service. For
keys that are imported from external sources or created in KMS, their confidenti
al information or sensitive data is used by other Alibaba Cloud services for data
encryption and protection.
• BYOK
KMS supports Bring Your Own Key (BYOK). You can lease your own keys to KMS for
encryption of cloud data to facilitate key management. The following types of keys can
be leased:
- Keys in KMI
Note:
Keys imported to HSMs managed in KMS cannot be exported by using any method
because secure key exchange algorithms are used in KMS. Operators or third parties are
not allowed to check the plaintext of keys. For more information, see #unique_5 and
#unique_6/unique_6_Connect_42_section_x1y_emf_972.
Issue: 20200703 5
Key Management Service Product Introduction / 2 Benefits
in KMS across multiple regions based on your business requirements without the need to
scale the underlying infrastructure.
KMS has passed strict security design and verification to ensure stringent protection of your
keys on the cloud.
• KMS only provides TLS-based access channels and uses secure transmission encryption
algorithm suites. It complies with security standards such as PCI DSS.
• KMS uses HSMs to host keys for higher levels of security. For more information, see
#unique_6.
Low costs
With KMS, you only pay for the resources that you use.
• You do not need to pay for the initial cost of HSMs, as well as the cost of operating,
maintaining, repairing, and replacing HSMs.
• KMS reduces the costs of building highly available and reliable cryptographic device
clusters and reduces the R&D and maintenance costs for user-created key management
facilities.
• KMS is integrated with other cloud services to eliminate the R&D overhead of a data
encryption system. You only need to manage keys to achieve controllable data
encryption on the cloud.
6 Issue: 20200703
Key Management Service Product Introduction / 3 Scenarios
3 Scenarios
This topic describes the common scenarios where Key Management Service (KMS) is used.
Common scenarios
Chief security Ensures the As a chief security officer (CSO), I need Help
officer security and to meet key management requirements information
compliance in some compliance standards and use systems meet
of informatio cryptographic technologies to meet more compliance
n systems. requirements for application and informatio requirements
n system security.
You can use data encryption to protect sensitive data generated or stored on the cloud.
Alibaba Cloud provides multiple ways to encrypt and protect sensitive data:
Issue: 20200703 7
Key Management Service Product Introduction / 3 Scenarios
• Envelope encryption
KMS provides envelope encryption, allowing you to store customer master keys (CMKs) in
KMS and deploy only encrypted data keys (EDKs). For more information, see #unique_21.
You can simply call the API operation to decrypt DKs only when necessary. For more
information, see #unique_22.
• Direct encryption
You can also call the API operations to encrypt or decrypt sensitive data directly with
CMKs. For more information, see #unique_23.
• Server-side encryption
If you use Alibaba Cloud services to store data, you can use the server-side encryption
feature of these services to encrypt and protect data in a simple and effective way. For
example, you can use the server-side encryption feature of OSS to protect buckets that
store sensitive data or use transparent data encryption (TDE) to protect tables that store
sensitive data. For more information, see #unique_20.
When KMS is integrated with other cloud services (in the server-side encryption method),
you can control the cloud computing and storage environment, isolate and protect your
computing and storage resources in a distributed multi-tenant system. You can control the
distributed computing and storage environment by managing the lifecycle, usage status
, and access control policies of CMKs in KMS. When KMS is integrated with ActionTrail, you
can check and audit KMS key usage. KMS is commonly used in the following scenarios to
control the cloud computing and storage environment:
• ECS
After you authorize ECS to use KMS keys, ECS can encrypt and protect system disks,
data disks, snapshots, and images. Then ECS resources can be controlled by KMS. For
example, to start an ECS instance, you must decrypt both the system disk and data disk
. You must encrypt snapshots created from encrypted disks. These restriction measures
enhance the security of ECS instances and storage resources through KMS.
• Persistent storage
Persistent storage services provided by Alibaba Cloud such as RDS, OSS, and NAS ensure
data storage reliability through the distributed and redundancy method. When KMS is
integrated with these services to encrypt data before it is stored, data redundancy in
8 Issue: 20200703
Key Management Service Product Introduction / 3 Scenarios
distributed systems becomes controllable and visible. For any read requests, data must
first be decrypted by KMS.
Enterprises or organizations may encounter the following situations when evaluating the
compliance requirements for cryptographic technologies:
• Compliance regulations require that information systems are protected with cryptograp
hic technologies and that the cryptographic technologies used meet relevant technical
standards and security specifications.
KMS provides the following capabilities to help enterprises meet compliance requirements:
• Managed HSMs
KMS provides managed hardware security modules (HSMs). Managed HSMs are
third-party hardware devices that are certified by regulatory agencies. They run in
an approved security mode. Managed HSMs have passed the certification by State
Cryptography Administration (SCA) and FIPS 140-2 Level 3 validation. For more
information, see #unique_6 and Using Managed HSM.
KMS supports automatic rotation of encryption keys. Enterprises can customize rotation
policies to quickly meet data security specifications and best practices. For more
information, see #unique_7 and #unique_8.
KMS stores all API call records in ActionTrail, which allows you to perform compliance
auditing on key usage. For more information, see #unique_18.
Issue: 20200703 9
Key Management Service Product Introduction / 3 Scenarios
As an ISV, you can also integrate KMS as a third-party data security solution to protect user
data in your services. After you allow customers to manage keys in KMS and authorize
ISV services to use these keys, KMS acts as a third-party security protection mechanism
between ISV services and customers. Customers and ISV services can work together to
protect system security.
• Customer administrators
Generate keys in KMS and manage their lifecycle. They can also use RAM to manage the
permissions to use keys and allow ISV services to use specified keys in KMS through the
#unique_24 method.
• ISV services
Use customer-specified keys to encrypt and protect data in ISV services by integrating
KMS API operations. For more information, see #unique_4.
• Customer auditors
10 Issue: 20200703
Key Management Service Product Introduction / 4 Terms
4 Terms
This topic describes the terms used in Key Management Service (KMS).
An Alibaba Cloud service. It provides features such as key hosting and cryptographic
operations. KMS implements security practices such as key rotation and can be integrated
with other cloud services to encrypt user data managed by these services. With KMS, you
can focus on developing services such as data encryption, data decryption, and digital
signature generation and verification. It helps you save costs in maintaining the security,
integrity, and availability of your keys.
The key is primarily used to encrypt data keys (DKs) and generate enveloped data keys
(EDKs), as well as to encrypt a small amount of data. You can call the #unique_25 operation
to create a CMK.
Envelope encryption
To encrypt business data, you can call the #unique_26 or #unique_27 operation to generate
a symmetric key and use the specified CMK to encrypt the symmetric key (EDK). The EDK
secures data when it is stored and transferred over unsecured communication processes.
You can retrieve the EDK when you need it. For more information, see #unique_21
Data key
Note:
You can call the #unique_26 operation to generate a DK, use the specified CMK to encrypt
the DK, and return the plaintext (DK) and ciphertext (EDK) of the DK.
Note:
If the plaintext of a DK is not needed, you can call the #unique_27 operation to return only
the ciphertext of the DK.
Issue: 20200703 11
Key Management Service Product Introduction / 4 Terms
The hardware device that performs cryptographic operations, and securely generates
and stores keys. Managed HSM provided by KMS can meet the testing and validation
requirements from regulatory agencies and provide users with high security assurances for
their keys managed in KMS. For more information, see #unique_6.
Encryption context
The encapsulation of authenticated encryption with associated data (AEAD). KMS uses
the imported encryption context as additional authenticated data (AAD) of the symmetric
encryption algorithm for cryptographic operations and therefore provides additional
integrity and authenticity for encrypted data. For more information, see #unique_10.
12 Issue: 20200703
Key Management Service Product Introduction / 5 Limits
5 Limits
This topic describes the limits of Key Management Service (KMS).
KMS is a region-specific service. It has different limits for different regions. For more
information about the regions supported by KMS, see #unique_28.
Resource quotas
KMS defines resource quotas to provide fast and elastic services. Some quotas only limit
the resources that you create, but do not apply to the resources that are created for you by
Alibaba Cloud. If the resources that you use do not belong to your Alibaba Cloud account,
the resources are not counted as a part of your resource quota.
If the quota of a resource is exhausted, the system reports the error Rejected.LimitExceeded
for other requests that create this type of resource, except for the current request.
The following table lists the KMS resource quotas for each Alibaba Cloud account in a
region. If you want to increase a quota, submit a ticket.
Customer master key 200 The maximum number of CMKs that can be
(CMK) created in a region
Request quotas
KMS sets a quota for the number of API operations that can be called per second. When the
API request quota is exceeded, KMS blocks valid requests and returns an error similar to
the following code. This type of error can be fixed by retries. You can configure the request
backoff and retry policies for your application.
{
"HttpStatus": 429
"Code": "Rejected.Throttling"
"Message": "QPS Limit Exceeded"
"RequestId": "e85db688-a2d3-44ca-9790-4259********"
Issue: 20200703 13
Key Management Service Product Introduction / 5 Limits
The following table lists the KMS request quotas for each Alibaba Cloud account in a region
. If you want to increase a quota, submit a ticket.
10 750 20 10
Aliyun_AES_256
Aliyun_SM4
10 200 20 10
RSA_2048
10 200 20 10
EC_P256
EC_P256K
EC_SM2
Note:
The default request quotas for CMKs are grouped by operation. All operations in a group
share the request quota for this group. The groups are defined as follows:
• Create operation group: consists of the CreateKey operation. For more information, see
#unique_25.
• Key operation group: includes the key operations for a specific CMK. For more
information, see #unique_4/unique_4_Connect_42_section_bmq_3mj_3gb.
• Read-only operation group: includes the operations that are related to CMKs, aliases,
and CMK tags and do not change the metadata, properties, or status of resources.
• Write operation group: includes the operations that are related to CMKs, aliases, and
CMK tags and change the metadata, properties, and status of resources.
14 Issue: 20200703