copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2019-04-03 |
key management service, kms, manage encryption keys, data encryption, data-at-rest, protect data encryption keys |
key-protect |
{:shortdesc: .shortdesc} {:codeblock: .codeblock} {:screen: .screen} {:new_window: target="_blank"} {:pre: .pre} {:tip: .tip} {:note: .note} {:important: .important}
{: #getting-started-tutorial}
{{site.data.keyword.keymanagementservicefull}} helps you provision encrypted keys for apps across {{site.data.keyword.cloud_notm}} services. This tutorial shows you how to create and add existing cryptographic keys by using the {{site.data.keyword.keymanagementserviceshort}} dashboard, so you can manage data encryption from one central location. {: shortdesc}
{: #get-started-keys}
From the {{site.data.keyword.keymanagementserviceshort}} dashboard, you can create new keys for cryptography, or you can import your existing keys.
Choose from two key types:
- Root keys
- Root keys are symmetric key-wrapping keys that you fully manage in {{site.data.keyword.keymanagementserviceshort}}. You can use a root key to protect other cryptographic keys with advanced encryption. To learn more, see Protecting data with envelope encryption.
- Standard keys
- Standard keys are symmetric keys that are used for cryptography. You can use a standard key to directly encrypt and decrypt data.
{: #create-keys}
After you create an instance of {{site.data.keyword.keymanagementserviceshort}}, you're ready to designate keys in the service.
Complete the following steps to create your first cryptographic key.
-
On the application details page, click Manage > Add key.
-
To create a new key, select the Create a key window.
Specify the key's details:
Table 1. Description of the Create a key settings Setting Description Name A unique, human-readable alias for easy identification of your key.
To protect your privacy, ensure that the key name does not contain personally identifiable information (PII), such as your name or location.
Key type The type of key that you would like to manage in {{site.data.keyword.keymanagementserviceshort}}. -
When you are finished filling out the key's details, click Create key to confirm.
Keys that are created in the service are symmetric 256-bit keys, supported by the AES-GCM algorithm. For added security, keys are generated by FIPS 140-2 Level 2 certified hardware security modules (HSMs) that are located in secure {{site.data.keyword.cloud_notm}} data centers.
{: #import-keys}
You can enable the security benefits of Bring Your Own Key (BYOK) by introducing your existing keys to the service.
Complete the following steps to add an existing key.
-
On the application details page, click Manage > Add key.
-
To upload an existing key, select the Import your own key window.
Specify the key's details:
Table 2. Description of the Import your own key settings Setting Description Name A unique, human-readable alias for easy identification of your key.
To protect your privacy, ensure that the key name does not contain personally identifiable information (PII), such as your name or location.
Key type The type of key that you would like to manage in {{site.data.keyword.keymanagementserviceshort}}. Key material The key material, such as a symmetric key, that you want to store in the {{site.data.keyword.keymanagementserviceshort}} service. The key that you provide must be base64 encoded. -
When you are finished filling out the key's details, click Import key to confirm.
From the {{site.data.keyword.keymanagementserviceshort}} dashboard, you can inspect the general characteristics of your new keys.
{: #get-started-next-steps}
Now you can use your keys to code your apps and services. If you added a root key to the service, you might want to learn more about using the root key to protect the keys that encrypt your at-rest data. Check out Wrapping keys to get started.
- To find out more about managing and protecting your encryption keys with a root key, check out Protecting data with envelope encryption.
- To find out more about integrating the {{site.data.keyword.keymanagementserviceshort}} service with other cloud data solutions, check out the Integrations doc.
- To find out more about programmatically managing your keys, check out the {{site.data.keyword.keymanagementserviceshort}} API reference doc {: new_window}.