Oracle Cloud Infrastructure OCI Gen-2 Cloud Security – Part IV (Key Management) (2024)

So far, I have discussed generic security concepts, IAM and Networking pertains to OCI Gen-2 Cloud. In this part I am going to discuss the Key Management Service that is available in Oracle Cloud Infrastructure OCI Gen-2 Cloud.

Oracle Cloud Infrastructure Key Management Service OCI KMS is a managed service that provides you with centralized management of the encryption of your data. KMS can be used to create master encryption keys and data encryption keys. KMS helps to rotate keys to generate new cryptographic material, enable or disable keys for use in cryptographic operations, assign keys to resources, and use keys for encryption and decryption.

OCI Object StorageandOCI Block Volumeintegrate with KMS to support encryption of data in buckets and block or boot volumes. Integration withOCI Identity and Access Management(IAM) lets you control who and what services can access which keys and what they can do with those keys.OCI Auditintegration gives you a way to monitor key usage.Audittracks administrative actions on keys and vaults.

Keys are stored on highly available and durable hardware security modules (HSM) that meet Federal Information Processing Standards (FIPS) 140-2 Security Level 3 security certification. KMS uses the Advanced Encryption Standard (AES) as its encryption algorithm and its keys are AES symmetric keys. This means that the HSM hardware is tamper-evident, has physical safeguards for tamper-resistance, requires identity-based authentication, and deletes keys from the device when it detects tampering.

Key Management Concepts

Keys

Keys are logical entities that represent one or more key versions that contain the cryptographic material used to encrypt and decrypt data, protecting the data where it is stored. When processed as part of an encryption algorithm, a key specifies how to transform plain-text into cipher-text during encryption and how to transform cipher-text into plain-text during decryption. KMS recognizes two types of encryption keys – Master Keys and Data Encryption Keys. Master encryption keys are created using theConsoleor API. KMS stores those keys in a key vault. After you have a master encryption key, you can then use the APIto generate data encryption keys.KMS introduces master encryption keys as an OCI resource.

Vaults

Key vaults are logical entities where KMS creates and durably stores keys. Vaults are partitions on a hardware security module that are isolated from one another to ensure the security and integrity of the encryption keys that are stored on them. The type of vault determines features and functionality such as degrees of storage isolation, access to management and encryption, scalability, and pricing. One virtual private vault can be created in each tenancy. KMS designates vaults as anOCI resource.

Key Versions

Each master encryption key is automatically assigned a key version. Rotation of keys results in KMS generating a new version. Periodically rotating keys limits the amount of data encrypted by one key version. Key rotation thereby reduces the risk if a key is ever compromised. A key’s unique, Oracle-assigned identifier, called an Oracle Cloud ID (OCID), remains the same across rotations, but the key version enables KMS to seamlessly rotate keys to meet any compliance requirements. Older key versions cannot be used for encryption after you rotate it, the key version remains available to decrypt any data that it previously encrypted.KMS removes the need to track which key version was used to encrypt what data because the key’s cipher-text contains the information thatKMS requires for decryption.

Hardware Security Modules

Upon creation of a master encryption key,KMS stores the key version within a hardware security module (HSM) to provide a layer of physical security. Any given key version, after it’s created, is replicated within the service infrastructure as a measure of protection against hardware failures. Key versions are not otherwise stored anywhere else and cannot be exported from an HSM.Key Managementuses HSMs that meet Federal Information Processing Standards (FIPS) 140-2 Security Level 3 security certification. This means that the HSM hardware is tamper-evident, has physical safeguards for tamper-resistance, requires identity-based authentication, and deletes keys from the device when it detects tampering.

Envelope Encryption

The data encryption key used to encrypt your data is, itself, encrypted with a master encryption key. This concept is known as envelope encryption.OCI services do not have access to the plain-text data without interacting withKey Managementand without access to the master encryption key that is protected byOCI Identity and Access Management(IAM). For decryption purposes,Object StorageandBlock Volumestore are the only the encrypted form of the data encryption key.

Key Management – Design Considerations

  • Regional service, replicates encryption keys across 3 ADs in a region
  • Block Volumes and Object Storage are integrated with KMS
  • Rotating a key does not automatically re-encrypt data that was previously encrypted with the old key version; this data is re-encrypted the next time it’s modified by the customer
  • If you suspect that a key has been compromised,you should re-encrypt all data protected by that key and disable the prior key version
  • You cannot import a key from your existing key management solution to Oracle Key Management. You cannot export encryption keys from the Oracle Key Management key vaults
  • You cannot delete keys, but can disable them. You can delete key vaults
  • You can schedule the deletion of a key vault by configuring awaiting period for deletion from 7 – 30 days
  • The key vault and all the keys created inside the key vault are deleted at the end of the waiting period, and all the data that was protected by those keys is no longer accessible.
  • After a key vault is deleted, it can’t be recovered

Conclusion

In this article I have discussed the Key Management Service that is available in the OCI that helps protecting the OCI resources. This article defines the various concepts in the Key Management Service and the best practices to follow to achieve the necessary security in OCI.

I will discuss the Edge Security in OCI in the next article and that would be the fifth and final of this series.

Oracle Cloud Infrastructure OCI Gen-2 Cloud Security – Part IV (Key Management) (2024)
Top Articles
Does a Refrigerator Make a Good Faraday Cage?
Firefox Addons for Penetration Testing
Jordanbush Only Fans
Koopa Wrapper 1 Point 0
Wisconsin Women's Volleyball Team Leaked Pictures
What are Dietary Reference Intakes?
Mikayla Campino Video Twitter: Unveiling the Viral Sensation and Its Impact on Social Media
A Fashion Lover's Guide To Copenhagen
Aquatic Pets And Reptiles Photos
Select Truck Greensboro
Nier Automata Chapter Select Unlock
Classic Lotto Payout Calculator
Craigslist Farm And Garden Tallahassee Florida
Available Training - Acadis® Portal
Apne Tv Co Com
Paychex Pricing And Fees (2024 Guide)
Ess.compass Associate Login
2020 Military Pay Charts – Officer & Enlisted Pay Scales (3.1% Raise)
Lola Bunny R34 Gif
Obituaries Milwaukee Journal Sentinel
Apartments / Housing For Rent near Lake Placid, FL - craigslist
Craigslist Dubuque Iowa Pets
Hesburgh Library Catalog
55Th And Kedzie Elite Staffing
John Deere 44 Snowblower Parts Manual
3 Ways to Format a Computer - wikiHow
Nurofen 400mg Tabletten (24 stuks) | De Online Drogist
Verizon TV and Internet Packages
Solarmovie Ma
Teenbeautyfitness
Reli Stocktwits
Domina Scarlett Ct
Instafeet Login
Dr Adj Redist Cadv Prin Amex Charge
Paperless Employee/Kiewit Pay Statements
Miami Vice turns 40: A look back at the iconic series
Sofia With An F Mugshot
The Attleboro Sun Chronicle Obituaries
Mauston O'reilly's
Tom Kha Gai Soup Near Me
Hawkview Retreat Pa Cost
My Gsu Portal
Online College Scholarships | Strayer University
Enjoy Piggie Pie Crossword Clue
Sml Wikia
683 Job Calls
Land of Samurai: One Piece’s Wano Kuni Arc Explained
211475039
Obituaries in Westchester, NY | The Journal News
Texas 4A Baseball
Latest Posts
Article information

Author: Lidia Grady

Last Updated:

Views: 6775

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lidia Grady

Birthday: 1992-01-22

Address: Suite 493 356 Dale Fall, New Wanda, RI 52485

Phone: +29914464387516

Job: Customer Engineer

Hobby: Cryptography, Writing, Dowsing, Stand-up comedy, Calligraphy, Web surfing, Ghost hunting

Introduction: My name is Lidia Grady, I am a thankful, fine, glamorous, lucky, lively, pleasant, shiny person who loves writing and wants to share my knowledge and understanding with you.