AWS Key Management Service HSM

Certificate #4884

Webpage information ?

Status active
Validation dates 18.11.2024
Sunset date 17-11-2026
Standard FIPS 140-3
Security level 3
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat Interim validation. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs
Exceptions
  • Operational environment: N/A
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
  • Documentation requirements: N/A
  • Cryptographic module security policy: N/A
Description The Amazon AWS Key Management Service HSM is a multi-chip standalone hardware cryptographic appliance designed to provide dedicated cryptographic functions to meet the security and scalability requirements of the AWS Key Management Service (KMS). The cryptographic boundary is defined as the secure chassis of the appliance. All key materials are maintained exclusively in volatile memory in the appliance and are erased immediately upon detection of physical tampering.
Version (Hardware) 3.0
Version (Firmware) 1.8.104
Vendor Amazon Web Services, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-256, AES-, HMAC
Asymmetric Algorithms
RSA 2048, RSA-OAEP, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA2
Schemes
MAC, Key Agreement
Randomness
DRBG, RNG
Elliptic Curves
P-256, P-384, P-521, secp256k1
Block cipher modes
ECB, CBC, CTR, GCM

Trusted Execution Environments
PSP

Security level
Level 3, Level 1
Side-channel analysis
physical tampering

Standards
FIPS 140-3, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, SP 800-38A, SP 800-38D, SP 800-38F, SP 800-90A, SP 800-108, SP 800-90B, SP 800-56B, SP 800-90, SP 800-56A, NIST SP 800-90B, ISO/IEC 24759

File metadata

Author Kelvin Yiu
Creation date D:20241025105050-07'00'
Modification date D:20241025105050-07'00'
Pages 71
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 18.11.2024 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4884,
  "dgst": "9326acebbb07fdc5",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA Decryption PrimitiveA1908",
        "KAS-ECC Sp800-56Ar3A1908",
        "Counter DRBGA1908",
        "SHA2-512A1908",
        "ECDSA KeyVer (FIPS186-4)A1908",
        "HMAC-SHA2-512A1908",
        "HMAC-SHA2-256A1908",
        "SHA-1A1908",
        "ECDSA SigGen (FIPS186-4)A1908",
        "SHA2-384A1908",
        "AES-ECBA1908",
        "RSA Signature PrimitiveA1908",
        "ECDSA SigVer (FIPS186-4)A1908",
        "KDA OneStep Sp800-56Cr1A1908",
        "ECDSA KeyGen (FIPS186-4)A1908",
        "HMAC-SHA2-384A1908",
        "HMAC-SHA-1A1908",
        "RSA SigGen (FIPS186-4)A1908",
        "RSA SigVer (FIPS186-4)A1908",
        "KDF SP800-108A1910",
        "RSA KeyGen (FIPS186-4)A1908",
        "Conditioning Component AES-CBC-MAC SP800-90BA1791",
        "AES-CBCA1908",
        "KTS-IFCA1908",
        "AES-CTRA1908",
        "AES-GCMA1908",
        "AES-KWPA1908",
        "SHA2-256A1908"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.8.104",
        "3.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 11
          },
          "ECDH": {
            "ECDH": 11
          },
          "ECDSA": {
            "ECDSA": 48
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA 2048": 7,
          "RSA-OAEP": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 40
        },
        "ECB": {
          "ECB": 4
        },
        "GCM": {
          "GCM": 46
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 26
        },
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 22,
          "P-384": 24,
          "P-521": 16,
          "secp256k1": 6
        }
      },
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES key (256": 1,
          "AES-256": 1,
          "HMAC-SHA1": 2,
          "HMAC-SHA1-96": 1,
          "RSA 2048": 7,
          "SHA-1": 4,
          "SHA2": 18,
          "SHA2-256": 15,
          "SHA2-384": 8,
          "SHA2-512": 10
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 3": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA2": 18
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 64
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 11,
          "FIPS 180-4": 1,
          "FIPS 186-4": 2,
          "FIPS 197": 1,
          "FIPS 198-1": 1
        },
        "ISO": {
          "ISO/IEC 24759": 2
        },
        "NIST": {
          "NIST SP 800-90B": 1,
          "SP 800-108": 4,
          "SP 800-38A": 1,
          "SP 800-38D": 3,
          "SP 800-38F": 3,
          "SP 800-56A": 1,
          "SP 800-56B": 2,
          "SP 800-90": 1,
          "SP 800-90A": 3,
          "SP 800-90B": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 105,
            "AES-": 1,
            "AES-256": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 14
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Kelvin Yiu",
      "/CreationDate": "D:20241025105050-07\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20241025105050-07\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 823150,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://docs.aws.amazon.com/kms/latest/APIReference/Welcome.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 71
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "cdd79043cc27890665e559456cec7b010c3d05c7370090181178e6adaee9fdbb",
    "policy_txt_hash": "1b8ac0e24014ee58e70a061ca94b97ae71c2722ed3050509f79745263dbfb3b6"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "Interim validation. No assurance of minimum security of SSPs (e.g., keys, bit strings) that are externally loaded, or of SSPs established with externally loaded SSPs",
    "certificate_pdf_url": null,
    "date_sunset": "2026-11-17",
    "description": "The Amazon AWS Key Management Service HSM is a multi-chip standalone hardware cryptographic appliance designed to provide dedicated cryptographic functions to meet the security and scalability requirements of the AWS Key Management Service (KMS). The cryptographic boundary is defined as the secure chassis of the appliance. All key materials are maintained exclusively in volatile memory in the appliance and are erased immediately upon detection of physical tampering.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Operational environment: N/A",
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A",
      "Documentation requirements: N/A",
      "Cryptographic module security policy: N/A"
    ],
    "fw_versions": "1.8.104",
    "historical_reason": null,
    "hw_versions": "3.0",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "AWS Key Management Service HSM",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-11-18",
        "lab": "ACUMEN SECURITY, LLC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Amazon Web Services, Inc.",
    "vendor_url": "https://aws.amazon.com/kms/"
  }
}