AWS KMS
Best practices and references below are based on published guidance from the cloud service provider and may reference native capabilities the cloud service provider offers. If you are not using the native security capabilities, the same security requirement can be met using other security capabilities your organization utilizes
Design Guidance:
Alias Name | ||
Target Key Id |
Description | ||
Enabled | ||
Key Usage |
Describe Key-Customer Master Key Spec | |
Describe Key-Custom Key Store Id | |
Describe Key-Origin |
Describe Custom Key Stores-Cloud Hsm Cluster Id | |
Describe Custom Key Stores-Custom Key Store Name | |
Describe Custom Key Stores-Trust Anchor Certificate |
Design Guidance:
Enable Key Rotation |
Design Guidance:
Pending Window In Days |
Design Guidance:
Tags |
Last modified 1yr ago