AWS Secrets Manager
AWS Secrets Manager works as a key-value store for secrets like passwords, access tokens, and cryptographic keys. AWS encrypts these secrets with the AWS Key Management Service (AWS-KMS).
This tutorial shows how to setup a KES server that uses AWS Secrets Manager as a persistent key store protected by AWS-KMS:
AWS Secrets Manager
-
Create AWS Access/Secret Key Pair
-
Go to the AWS console
-
Create a new user
For details on adding a new AWS user, see the AWS docs.
-
Use the
Programmatic access
type to create a new access key / secret key pair
-
-
Attach an AWS Policy
Attach a policy or policies to the new user that grant access to the AWS Secrets Manager and the AWS-KMS.
Your AWS IAM user needs to have to following permissions:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "Stmt1578498399136", "Action": [ "secretsmanager:CreateSecret", "secretsmanager:DeleteSecret", "secretsmanager:GetSecretValue", "secretsmanager:ListSecrets" ], "Effect": "Allow", "Resource": "*" }, { "Sid": "Stmt1578498562539", "Action": [ "kms:Decrypt", "kms:DescribeKey", "kms:Encrypt" ], "Effect": "Allow", "Resource": "*" } ] }
This example policy grants access to all KMS and SecretsManager resources. You can restrict access by specifying an AWS ARN asResource
instead of*
.AWS has predefined policies (SecretsManagerReadWrite
andAWSKeyManagementServicePowerUser
). However, these grant more permissions than needed.
KES Server Setup
-
Generate KES Server Private Key & Certificate
First, we need to generate a TLS private key and certificate for our KES server. A KES server is secure-by-default and can only be run with TLS. Here we use self-signed certificates for simplicity.
The following command generates a new TLS private/public key pair and a certificate for the IP address
127.0.0.1
with the DNS name oflocalhost
:$ kes identity new --ip "127.0.0.1" localhost Private key: private.key Certificate: public.crt Identity: 2e897f99a779cf5dd147e58de0fe55a494f546f4dcae8bc9e5426d2b5cd35680
If you already have a TLS private key & certificate, such as from WebPKI or an internal CA, you can use them instead. Remember to adjust thetls
config section later on. -
Generate Client Credentials
The following command generates a new TLS private/public key pair:
$ kes identity new --key=client.key --cert=client.crt MyApp Private key: client.key Certificate: client.crt Identity: 02ef5321ca409dbc7b10e7e8ee44d1c3b91e4bf6e2198befdebee6312745267b
The
Identity
is a unique fingerprint of the public key inclient.crt
that you can re-compute at any time:$ kes identity of client.crt Identity: 02ef5321ca409dbc7b10e7e8ee44d1c3b91e4bf6e2198befdebee6312745267b
-
Configure KES Server
Create the KES server configuration file:
config.yml
. The identity must match what is in the policy section of theclient.crt
identity.address: 0.0.0.0:7373 # Listen on all network interfaces on port 7373 admin: identity: disabled # We disable the admin identity since we don't need it in this guide tls: key: private.key # The KES server TLS private key cert: public.crt # The KES server TLS certificate policy: my-app: allow: - /v1/key/create/my-key* - /v1/key/generate/my-key* - /v1/key/decrypt/my-key* identities: - 02ef5321ca409dbc7b10e7e8ee44d1c3b91e4bf6e2198befdebee6312745267b # Use the identity of your client.crt keystore: aws: secretsmanager: endpoint: secretsmanager.us-east-2.amazonaws.com # Use the SecretsManager in your region. region: us-east-2 # Use your region kmskey: "" # Your AWS-KMS master key (CMK) - optional. credentials: accesskey: "" # Your AWS Access Key secretkey: "" # Your AWS Secret Key
-
Start KES Server
$ kes server --config config.yml --auth off
Linux Swap Protection:In Linux environments, KES can use the
mlock
syscall to prevent the OS from writing in-memory data to disk (swapping). This prevents leaking sensitive data.Use the following command to allow KES to use the
mlock
syscall without running withroot
privileges:sudo setcap cap_ipc_lock=+ep $(readlink -f $(which kes))
Start a KES server instance with memory protection:
kes server --config config.yml --auth off --mlock
KES CLI Access
-
Set
KES_SERVER
EndpointThis environment variable tells the KES CLI which server it should talk to.
$ export KES_SERVER=https://127.0.0.1:7373
-
Use Client Credentials
The following environment variables set the access credentials the KES CLI uses to talk to a KES server.
$ export KES_CLIENT_CERT=client.crt
$ export KES_CLIENT_KEY=client.key
-
Test access
Perform any API operation that is allowed based on the policy we assigned above.
For example, to create a key:
$ kes key create my-key-1
Use the key to generate a new data encryption key:
$ kes key dek my-key-1 { plaintext : UGgcVBgyQYwxKzve7UJNV5x8aTiPJFoR+s828reNjh0= ciphertext: eyJhZWFkIjoiQUVTLTI1Ni1HQ00tSE1BQy1TSEEtMjU2IiwiaWQiOiIxMTc1ZjJjNDMyMjNjNjNmNjY1MDk5ZDExNmU3Yzc4NCIsIml2IjoiVHBtbHpWTDh5a2t4VVREV1RSTU5Tdz09Iiwibm9uY2UiOiJkeGl0R3A3bFB6S21rTE5HIiwiYnl0ZXMiOiJaaWdobEZrTUFuVVBWSG0wZDhSYUNBY3pnRWRsQzJqWFhCK1YxaWl2MXdnYjhBRytuTWx0Y3BGK0RtV1VoNkZaIn0= }
Using KES with a MinIO Server
MinIO Server requires KES to enable server-side data encryption.
See the KES for MinIO instruction guide for additional steps needed to use your new KES Server with a MinIO Server.
Configuration References
The following section describes the Key Encryption Service (KES) configuration settings to use AWS Secrets Manager and AWS Key Management System as the root KMS to store external keys, such as the keys used for Server-Side Encryption on a MinIO Server.