Reputation: 11
What happens to the assets or objects that are encrypted with a "CMK Key1":
Can the new "CMK Key2" which is also attached to the CMK Key1's Alias "CMK ALIAS-xyz" be used for re-encrypting the already existing data objects of the assets that were encrypted with the "CMK Key1", without any DOWNTIME/Code Changes?
When we rotate the Aliased keys, what happens to the direct references to the CMK in the code?
<PLEASE SHARE YOUR PRACTICAL EXPERIENCE - NOT JUST THEORETICAL DOCUMENTATION>
IMAGE - Pictorial representation of above questions
My Current observations:
SUPPORTING ALIASES/Points that say it is possible:
CONCERNs/Points that say it is not possible:
Sources Referred To:
https://docs.aws.amazon.com/kms/latest/developerguide/alias-authorization.html
https://docs.aws.amazon.com/kms/latest/developerguide/alias-access.html
https://docs.amazonaws.cn/en_us/kms/latest/developerguide/abac.html
(Please ignore this if you wish) On a different note, if the CMK has imported key material, you cannot automate the Key Rotation: "You cannot automatically rotate asymmetric CMKs, CMKs with imported key material, or CMKs in custom key stores. However, you can rotate them manually." "When you begin using the new CMK, be sure to keep the original CMK enabled so that AWS KMS can decrypt data that the original CMK encrypted. When decrypting data, KMS identifies the CMK that was used to encrypt the data, and it uses the same CMK to decrypt the data. As long as you keep both the original and new CMKs enabled, AWS KMS can decrypt any data that was encrypted by either CMK."
Upvotes: 1
Views: 225