From the course: Complete Guide to AWS Security and Compliance Management

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Understanding AWS CloudHSM

Understanding AWS CloudHSM

- [Instructor] While KMS is a wonderful tool for managing encryption keys, the Cloud Hardware Security Module offers a greater level of customer control. If your organization requires more flexibility than what KMS offers, CloudHSM provides a viable alternative. Let's explore the compelling advantages CloudHSM provides when compared with KMS. First off, while KMS is based on the shared hardware model that makes the public cloud possible, cloud HSM is delivered via a single-tenant access to a dedicated, highly-available cluster. With KMS, you have the option of creating your own encryption keys or letting AWS do that for you. However, CloudHSM works only with keys that you create. This gives you greater control, as AWS has no access to the keys that you've created. While KMS is FIPS 140-2-compliant, CloudHSM goes even further by being Level 3-compliant. If you run workloads that require that additional level of compliance, the only way to get there in AWS is with CloudHSM. CloudHSM…

Contents