AWS News Blog
Amazon S3 Express One Zone now supports AWS KMS with customer managed keys
|
Amazon S3 Express One Zone, a high-performance, single-Availability Zone (AZ) S3 storage class, now supports server-side encryption with AWS Key Management Service (KMS) keys (SSE-KMS). S3 Express One Zone already encrypts all objects stored in S3 directory buckets with Amazon S3 managed keys (SSE-S3) by default. Starting today, you can use AWS KMS customer managed keys to encrypt data at rest, with no impact on performance. This new encryption capability gives you an additional option to meet compliance and regulatory requirements when using S3 Express One Zone, which is designed to deliver consistent single-digit millisecond data access for your most frequently accessed data and latency-sensitive applications.
S3 directory buckets allow you to specify only one customer managed key per bucket for SSE-KMS encryption. Once the customer managed key is added, you cannot edit it to use a new key. On the other hand, with S3 general purpose buckets, you can use multiple KMS keys either by changing the default encryption configuration of the bucket or during S3 PUT requests. When using SSE-KMS with S3 Express One Zone, S3 Bucket Keys are always enabled. S3 Bucket Keys are free and reduce the number of requests to AWS KMS by up to 99%, optimizing both performance and costs.
Using SSE-KMS with Amazon S3 Express One Zone
To show you this new capability in action, I first create an S3 directory bucket in the Amazon S3 console following the steps to create a S3 directory bucket and use apne1-az4
as the Availability Zone. In Base name, I enter s3express-kms
and then a suffix that includes the Availability Zone ID is automatically added to create the final name. Then, I select the checkbox to acknowledge that Data is stored in a single Availability Zone followed by Create bucket.
Now we’ll walk through using the AWS Command Line Interface (AWS CLI) to set up encryption on the bucket we just created.
To use SSE-KMS with S3 Express One Zone via the AWS CLI, you need an AWS Identity and Access Management (IAM) user or role with the following policy . This policy allows the CreateSession API operation, which is necessary to successfully upload and download encrypted files to and from your S3 directory bucket.
I will use PutBucketEncryption
API to set my default bucket encryption to SSE-KMS. Here is an example of the AWS CLI:
aws s3api put-bucket-encryption \
--bucket s3express-kms--apne1-az4--x-s3 \
--server-side-encryption-configuration \
'{"Rules": [{"ApplyServerSideEncryptionByDefault":\
{"SSEAlgorithm": "aws:kms", \
"KMSMasterKeyID": "1234abcd-12ab-34cd-56ef-1234567890ab"\
},\
"BucketKeyEnabled":true}]}'
Any new object I upload to this S3 directory bucket will be automatically encrypted using my AWS KMS key. With the PutObject command, I upload a new file named confidential-doc.txt
to my S3 directory bucket.
As a success of the previous command I receive the following output:
Checking the object’s properties with HeadObject command, I see that it’s encrypted using SSE-KMS with the key that I created before:
I get the following output:
I download the encrypted object with GetObject:
As my session has the necessary permissions, the object is downloaded and decrypted automatically.
For this second test, I use a different IAM user with a policy that is not granted the necessary KMS key permissions to download the object. This attempt fails with an AccessDenied error, demonstrating that the SSE-KMS encryption is functioning as intended.
This demonstration shows how SSE-KMS works seamlessly with S3 Express One Zone, providing an additional layer of security while maintaining ease of use for authorized users.
Things to know
Getting started – You can enable SSE-KMS for S3 Express One Zone using the AWS CLI or AWS SDKs. Set the default encryption configuration of your S3 directory bucket to SSE-KMS and specify your AWS KMS key. Remember, you can only use one customer managed key per S3 directory bucket for its lifetime.
Regions – S3 Express One Zone support for SSE-KMS using customer managed keys is available in all AWS Regions where S3 Express One Zone is currently available.
Performance – Using SSE-KMS with S3 Express One Zone does not impact request latency. You’ll continue to experience the same single-digit millisecond data access.
Pricing – You pay AWS KMS charges to generate and retrieve data keys used for encryption and decryption. Visit the AWS KMS pricing page for more details. In addition, when using SSE-KMS with S3 Express One Zone, S3 Bucket Keys are enabled by default for all data plane operations except for CopyObject and UploadPartCopy, and can’t be disabled. This reduces the number of requests to AWS KMS by up to 99%, optimizing both performance and costs.
AWS CloudTrail integration – You can audit SSE-KMS actions on S3 Express One Zone objects using AWS CloudTrail. Learn more about that in my previous blog post.
– Eli.
Updated on September 19, 2024 – We updated the CLI example to configure default encryption for an existing bucket instead of the console.