Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

How does Amazon SSE-S3 key rotation work?

I'm trying to wrap my mind around Amazon's Server Side Encryption options so I can start asking S3 to encrypt my data at rest when my applications upload files.

So far the AWS-Managed Encryption Keys option sounds like what I'm looking for (Model C):

enter image description here

But then it says

As an additional safeguard, this key itself is encrypted with a periodically rotated master key unique to Amazon S3 that is securely stored in separate systems under AWS control.

How does this rotation work? Does this mean that every time AWS rotates their key-encrypting key, they have to re-encrypt EVERY SINGLE Data Key stored in S3???

That seems crazy to me, and I don't want to sound crazy when I try to convince my boss that this is a good idea :)

like image 657
mikhail Avatar asked Mar 18 '15 16:03

mikhail


People also ask

How does AWS key rotation work?

New AWS managed keys are automatically rotated one year after they are created, and approximately every year thereafter. Existing AWS managed keys are automatically rotated one year after their most recent rotation, and every year thereafter. You cannot enable or disable key rotation for AWS owned keys.

How does SSE-S3 encryption work?

SSE-S3 encrypts data at rest using 256-bit Advanced Encryption Standard(AES-256). Each object is encrypted with a unique data/object key and each data/object key is further encrypted using a master key (envelope encryption) which is regularly rotated so as to prevent data getting compromised.

Does SSE-S3 use KMS?

With SSE-KMS, and contrary to the default SSE-S3 where the encryption key is managed by AWS, you will use KMS to create an encryption key (Customer Managed Key: CMK) and use it to encrypt the data stored in S3.

Are AWS managed keys automatically rotated?

All AWS managed keys are automatically rotated every year. You cannot change this rotation schedule. In May 2022, AWS KMS changed the rotation schedule for AWS managed keys from every three years (approximately 1,095 days) to every year (approximately 365 days).


1 Answers

For each object you upload, a new encryption key is generated, and used to encrypt the object before it's stored to disk.

Having the object stored encrypted means the it's computationally infeasible for someone in possession of the raw data as stored on disk to decrypt it... but, of course, anyone in possession of that key could decrypt it, so the keys have to be stored securely, and in a relatively useless form, and that's done by encrypting them with the master key.

To compromise the stored object, you have to have the specific encryption key for that object... but even if you have it, it's useless since it's also been encrypted. To get it decrypted, or at least have it used on your behalf, you have to have the master key, or have a trust relationship with an entity that controls the master key and can use it on your behalf.

So far, all I've really done is stated the obvious, of course.

The encryption keys, themselves, are tiny, only a few tens of bytes each. When the master key is rotated, the object-specific encryption keys are decrypted with the old key, and re-encrypted with the new key. The new versions are stored, and the old versions are discarded.

Since the keys are small, this is not the massive operation that would be required if the objects themselves were decrypted and re-encrypted... but it's only the per-object encryption keys that are decrypted and re-encrypted when the master key is rotated.

Several analogies could be drawn to an apartment complex, where keys are stored in a common lockbox, where changing the lockbox lock would restrict future access to individual apartments by restricting access to the individual apartment keys by restricting access to the common lockbox. The analogy breaks down, because physical keys are easily copied, among other reasons... but it's apparent, in this illustration, that changing the lockbox lock (relatively simple operation) would be unrelated to changing the lock on one or more apartments (a much more substantial operation).

The bottom line, in this scenario, they create a new secret key to encrypt/decrypt each object you upload, then store that secret key in an encrypted form... periodically, and transparently to you, they change their stored representation of that secret key as a preventative measure.

like image 170
Michael - sqlbot Avatar answered Sep 26 '22 13:09

Michael - sqlbot