Enterprise guardrails for AWS Key Management Service
Turbot Guardrails has added enterprise guardrails for the use of AWS Key Management Service, making it easy and safe to put this encryption technology in your application teams' hands.
AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys.
Turbot Guardrails uses KMS to encrypt and protect sensitive information stored in your Turbot Guardrails Clusters - we've found it to be reliable, easy to use and very good value for the quality of encryption at low monthly rates.
Available immediately, Turbot Guardrails has added enterprise guardrails for the use of KMS, making it easy and safe to put this encryption technology in your application teams hands. Specifically:
Control which teams have access to use KMS.
Use newly predefined AWS/KMS/{Metadata,Operator,Admin} groups for KMS.
Users in Turbot Guardrails standard AWS/{Metadata,Operator,Admin} groups have KMS access immediately integrated.
Rely on Turbot Guardrails lockdown and continuous enforcement of key policies and grants, preventing the sharing of access to keys with other AWS accounts or organizations but still allowing grants of keys to AWS services requiring access.
Enforce the use of KMS encryption for S3 objects, RDS instances and/or Redshift clusters. Turbot Guardrails controls for those services have been updated to be aware of KMS and different encryption levels.
We believe that KMS will become a key part of application development and data security with AWS services for many of our customers. Please let us know how you are using KMS and any other best practices or controls that Turbot Guardrails can help automate!
Getting started with KMS
The KMS application has a default setting of Disabled in Turbot Guardrails.
If you wish to block the use of KMS for all accounts:
- Open your Turbot Guardrails Console in a browser window.
- Login as a Cluster Administrator.
- Browse to ADMIN, then Options.
- Navigate to Application Options, KMS.
- Set KMS App Enabled to Disabled or Enabled.
- Click Customize, then Recommend as Default or Require by Policy.