- Products›
- Amazon Key Management Service (KMS)
Amazon Key Management Service FAQs
Page topics
General
Open all• Create keys with a unique alias and description
• Define which IAM users and roles can manage keys
• Define which IAM users and roles can use keys to encrypt and decrypt data
• Choose to have Amazon KMS automatically rotate your keys on an annual basis
• Temporarily disable keys so they cannot be used by anyone
• Re-enable disabled keys
• Delete keys that you no longer use
• Audit use of keys by inspecting logs in Amazon CloudTrail
Amazon KMS is integrated with Amazon Web Services services and client-side toolkits that use a method known as envelope encryption to encrypt your data. Under this method, KMS generates data keys which are used to encrypt data and are themselves encrypted using your master keys in KMS. Data keys are not retained or managed by KMS. Amazon services encrypt your data and store an encrypted copy of the data key along with the data it protects. When you ask an Amazon Web Services service to decrypt your data, it requests KMS on your behalf to first decrypt the data key using the correct master key. If the user requesting data from the Amazon Web Services service is authorized to decrypt under your master key policy, the service will receive the decrypted data key from KMS with which it can decrypt your data. All requests to use your master keys are logged in Amazon CloudTrail so you can understand who used which master key under which conditions.
If you don’t specify a customer managed CMK, the service in question will create an Amazon Web Services managed CMK the first time you try to create an encrypted resource within that service. Amazon Web Services manages the access and lifecycle policies for Amazon Web Services managed CMKs on your behalf; you aren’t allowed to modify anything about these types of keys. Also, users outside the account in which the Amazon Web Services managed CMK exists cannot use this key. You can verify the Amazon Web Services managed keys in your account and all usage is logged in Amazon CloudTrail, but you have no direct control over the keys themselves. You are not billed for any of these keys that exist in your account. However, you are billed for KMS API requests.
Yes. You can schedule deletion for a customer managed CMK and its associated metadata with a configurable waiting period from 7 to 30 days. This waiting period allows you to verify the impact of deleting a key on your applications and users that depend on it. The default waiting period is 30 days. You can cancel key deletion during the waiting period. The key cannot be used if it is scheduled for deletion until you cancel the deletion during the waiting period. The key gets deleted at the end of the configurable waiting period if you don’t cancel the deletion. Once a key is deleted, you can no longer use it. All data protected under a deleted master key is inaccessible.
Billing
Open allYou are billed for all customer managed (CMKs) you create, and for API requests made to the service each month. You are not charged for the existence of Amazon Web Services managed CMKs created on your behalf, but you will be charged each time they are used.
For current pricing information, please visit the Amazon KMS pricing page .