Skip to main content

Key Management

Key Management Service is a tool provided by cloud service providers to securely create, store, and manage cryptographic keys used to encrypt and decrypt sensitive data.

Release Details

Version:
DEV
Assurance Level:
Release Manager:
DB
Development Build

Contributors

DT
Development Team

Change Log

  • Development build - no formal changelog available

Capabilities

IDTitleDescriptionThreat Mappings
CCC.KeyMgmt.F01AES-256Support for the AES-256 Advanced Encryption Standard with a 256-bit key for encryption and decryption.
0
CCC.KeyMgmt.F02RSA-2048Supports the RSA algorithm with a key size of 2048 bits for encryption and digital signatures.
0
CCC.KeyMgmt.F03RSA-3072Supports the RSA algorithm with a key size of 3072 bits for encryption and digital signatures.
0
CCC.KeyMgmt.F04RSA-4096Supports the RSA algorithm with a key size of 4096 bits for encryption and digital signatures.
0
CCC.KeyMgmt.F05EC-P256Supports the elliptic curve signing algorithm using the P-256 Curve for digital signatures.
0
CCC.KeyMgmt.F06EC-P256KSupports the elliptic curve signing algorithm using the Secp256k1 Curve for digital signatures.
0
CCC.KeyMgmt.F07EC-P384Supports the elliptic curve signing algorithm using the P-384 Curve for digital signatures.
0
CCC.KeyMgmt.F08Key CreationSupports secure key creation within the key management service using the supported algorithms.
0
CCC.KeyMgmt.F09Encrypt dataProvides the ability to securely encrypt data using a managed key in the supported encryption algorithms.
0
CCC.KeyMgmt.F10Decrypt dataProvides the ability to securely decrypt data using a managed key in the supported encryption algorithms.
1
CCC.KeyMgmt.F11Create Digital SignatureSupports the generation of a digital signature for data using the supported signing algorithms.
0
CCC.KeyMgmt.F12Verify Digital SignatureSupports the verification of the digital signature of some data using the supported signing algorithms.
0
CCC.KeyMgmt.F13Supports FIPS 140-2 Level 3Supports FIPS 140-2 Level 3 certified Hardware Security Modules (HSM).
0
CCC.KeyMgmt.F14Key VersioningProvides the ability to manage multiple versions of a key.
1
CCC.KeyMgmt.F15Key labelSupports the ability to tag a managed key with user defined labels.
0
CCC.KeyMgmt.F16Disable keySupports the ability to disable a managed key without deletion.
1
CCC.KeyMgmt.F17Enable keySupports the ability to re-enable a disabled managed key.
1
CCC.KeyMgmt.F18Soft DeleteSupports the ability to prevent the immediate deletion of a managed key. This includes the ability to recover accidental deletion of keys within a grace period.
1
CCC.KeyMgmt.F19Delete KeySupports the ability to permanently delete a managed key after the grace period defined on soft delete.
1
CCC.KeyMgmt.F20Automatic Symmetric Key RotationSupports the ability to automatically rotate a managed symmetric key as long as the key was generated within the KMS.
1
CCC.KeyMgmt.F21Manual Key RotationSupports the ability to manually rotate a managed key.
1
CCC.KeyMgmt.F22Key ImportSupports the ability to import externally generated keys into the KMS.
1
CCC.KeyMgmt.F23Key ExpirySupports the ability to set an expiration date for a key
0
CCC.KeyMgmt.F24Key ReplicationSupports the ability to securely replicate a key across different regions using automated or manual process.
0
CCC.Core.F01Encryption in Transit Enabled by DefaultThe service automatically encrypts all data using industry-standard cryptographic protocols prior to transmission via a network interface.
0
CCC.Core.F02Encryption at Rest Enabled by DefaultThe service automatically encrypts all data using industry-standard cryptographic protocols prior to being written to a storage medium.
0
CCC.Core.F03Access Log PublicationThe service automatically publishes structured, verbose records of activities performed within the scope of the service by external actors.
0
CCC.Core.F06Access ControlThe service automatically enforces user configurations to restrict or allow access to a specific component or a child resource based on factors such as user identities, roles, groups, or attributes.
1
CCC.Core.F07Event PublicationThe service automatically publishes a structured state-change record upon creation, deletion, or modification of data, configuration, components, or child resources.
0
CCC.Core.F08Data ReplicationThe service automatically replicates data across multiple deployments simultaneously with parity, or may be configured to do so.
0
CCC.Core.F09Metrics PublicationThe service automatically publishes structured, numeric, time-series data points related to the performance, availability, and health of the service or its child resources.
0
CCC.Core.F10Log PublicationThe service automatically publishes structured, verbose records of activities, operations, or events that occur within the service.
0
CCC.Core.F14API AccessThe service exposes a port enabling external actors to interact programmatically with the service and its resources using HTTP protocol methods such as GET, POST, PUT, and DELETE.
0

Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.KeyMgmt.TH01Deletion or Disabling of Key Versions Causing Denial of Service or Data Loss Disabling, scheduling deletion, or permanently purging KMS key versions that protect sensitive data can prevent required decryption or signing operations. Service interruption or irreversible data loss may occur if the key material is no longer recoverable.
1
1
1
CCC.KeyMgmt.TH02Unrestricted Use of a KMS Key to Decrypt DataMisconfigured permissions that allow broad invocation of the Decrypt API can expose plaintext data, enabling unintended disclosure or exfiltration of sensitive information.
1
1
1
CCC.KeyMgmt.TH03Key Rotation is Disabled or Delayed Beyond Policy LimitsModification of automatic or manual rotation settings can keep older key material active longer than intended, decreasing cryptographic resilience and extending exposure in the event of key compromise.
1
1
1
CCC.KeyMgmt.TH04Introduction of Weak or Compromised Key Material During ImportInsufficient validation during the key-import process may allow weak, back-doored, or otherwise compromised key material to be introduced, reducing the overall strength of subsequent cryptographic operations.
1
1
1
CCC.Core.TH01Access is Granted to Unauthorized UsersLogic designed to give different permissions to different entities may be misconfigured or manipulated, allowing unauthorized entities to access restricted parts of the service, its data, or its child resources. This could result in a loss of data confidentiality or tolerance of unauthorized actions which impact the integrity and availability of resources and data.
1
1
4
CCC.Core.TH04Data is Replicated to Untrusted or External LocationsSystems are susceptible to unauthorized access or interception by actors with political or physical control over the network in which they are deployed. Confidentiality may be impacted if the data is replicated to a network where the geopolitical status is untrusted, unstable, or insecure.
1
1
1
CCC.Core.TH12Resource Constraints are ExhaustedExceeding the resource constraints through excessive consumption, resource-intensive operations, or lowering of rate-limit thresholds can impact the availability of elements such as memory, CPU, or storage. This may disrupt availability of the service or child resources by denying the associated functionality to users. If the impacted system is not designed to expect such a failure, the effect could also cascade to other services and resources.
1
1
0
CCC.Core.TH13Resource Tags are ManipulatedWhen resource tags are altered, it can lead to misclassification or mismanagement of resources. This can reduce the efficacy of organizational policies, billing rules, or network access rules. Such changes could cause compromised confidentiality, integrity, or availability of the system and its data.
1
1
0

Controls

IDTitleObjectiveControl FamilyThreat MappingsGuideline MappingsAssessment Requirements
CCC.KeyMgmt.C01Alert on Key-version ChangesGenerate near-real-time alerts when a KMS key version is disabled or scheduled for deletion, enabling rapid investigation and recovery. Logging and Metrics Publication
1
2
1
CCC.KeyMgmt.C02Limit Decrypt PermissionsRestrict the Decrypt operation to authorised principals only, applying the principle of least privilege to protect sensitive data. Identity and Access Management
1
2
1
CCC.Core.C03Implement Multi-factor Authentication (MFA) for AccessEnsure that all sensitive activities require two or more identity factors during authentication to prevent unauthorized access. Identity and Access Management
1
6
4
CCC.Core.C05Prevent Access from Untrusted EntitiesEnsure that secure access controls enforce the principle of least privilege to restrict access to authorized entities from explicitly trusted sources only. Identity and Access Management
1
8
6
CCC.KeyMgmt.C03Enforce Automatic RotationEnsure symmetric keys rotate automatically within policy intervals to reduce exposure of key material. Key Lifecycle Management
1
2
1
CCC.KeyMgmt.C04Validate Imported KeysAccept only externally generated keys that meet approved cryptographic strength and provenance requirements. Key Lifecycle Management
1
2
1
CCC.Core.C01Encrypt Data for TransmissionEnsure that all communications are encrypted in transit to protect data integrity and confidentiality. Data
1
8
5
CCC.Core.C02Encrypt Data for StorageEnsure that all data stored is encrypted at rest using strong encryption algorithms. Data
1
7
1
CCC.Core.C06Restrict Deployments to Trust PerimeterEnsure that the service and its child resources are only deployed on infrastructure in locations that are explicitly included within a defined trust perimeter. Data
1
4
2
CCC.Core.C10Restrict Data Replication to Trust PerimeterEnsure that data is only replicated on infrastructure in locations that are explicitly included within a defined trust perimeter. Data
1
4
1
CCC.Core.C04Log All Access and ChangesEnsure that all access attempts are logged to maintain a detailed audit trail for security and compliance purposes. Logging & Monitoring
1
5
3