Store HSM on Hashicorp Vault

AIStor Key Manager supports using Hashicorp Vault for storing the Hardware Security Module (HSM) key associated with a Root Encryption Key (REK).

K e y D a t a b a s e R D e e a c d r y e p n t c r D y B p t w e i d t h R o R o o t o t K e K y e y A I S t o r K e y M a n D a e g c e r r y p t u P s l i a n i g n t t e r x a t n s R i o t o t e n K g e i y n e e n c r y p t i o n H a k s e h y i c o r p V a u l t

The Vault instance stores the HSM such that a user with access to the cluster Key Manager has no immediate access to the plaintext key value. You can enable the external HSM Key Manager at any time after completing the initial installation.

Prerequisites

  • The local or cluster Key Manager deployment for supporting AIStor Object Store Server Side Encryption
  • The Hashicorp Vault deployment for storing the HSM.
  • Key Manager Operator chart 1.1.2 or later
  • Key Manager chart 2.0.2 or later

The Hashicorp Vault instance must provide support for the transit engine to support external HSM storage. The transit configuration must allow the following set of permissions:

path "transit/encrypt/minkms-sealing-key" {
   capabilities = [ "update" ]
}
path "transit/decrypt/minkms-sealing-key" {
   capabilities = [ "update" ]
}
path "transit/hmac/minkms-sealing-key" {
   capabilities = [ "update" ]
}

Refer to the Vault documentation for guidance on setup and configuration.

See the installation instructions for further guidance on deploying AIStor Key Manager.

Procedure

  1. Create the necessary tokens for authenticating to Vault

    Key Manager supports either the approle or the kubernetes authentication method.

    Prepare the following for this procedure:

  2. Modify the values file for the cluster Key Manager

    Open the chart values file in your preferred text editor and add the keymanager.configuration.hsm.hashicorp.vault section:

  3. (Optional) Disable the local HSM

    You can disable the local HSM used to initialize the cluster Key Manager after configuring the external HSM. This prevents using that HSM or its associated Root Encryption Key (REK) for accessing the encryption key database.

    To disable the local HSM, comment out or remove the keymanager.configuration.hsm.key value from the values.yaml file.

  4. Update the chart with the new values.yaml:

    Use the helm upgrade command to upgrade the chart with the new values.yaml:

    helm upgrade aistor-keymanager minio/aistor-keymanager \
      -n aistor-keymanager \
      -f keymanager-values.yaml