Store HSM on Entrust KeyControl
MinIO KMS supports using Entrust KeyControl for storing the Hardware Security Module (HSM) key associated with a Root Encryption Key (REK).
The KeyControl instance stores the HSM such that a user with access to the cluster MinIO KMS has no immediate access to the plaintext key value. You can enable the external HSM MinIO KMS at any time after completing the initial installation.
Configuring an external KMS for HSM storage can help meet compliance requirements around keeping root or master keys on the same system as the encryption database. The total security of the system relies on protections applied to the final key in any such KMS chain. Ultimately basic security measures such as root access protection and systems of least privilege carry the same weight and importance across all encryption related services.
Prerequisites
This procedure assumes the following installations:
- The local or cluster MinIO KMS deployment
- The Entrust KeyControl deployment
The Entrust KeuControl instance must provide support for Application Security Vaults to support external HSM storage. The KeyControl user account used by MinIO KMS to access the application security vault must allow the following set of permissions:
EncryptDecryptGet Keys List
Refer to your Entrust KeyControl documentation for guidance on how to create a application security vault users and assign policies.
See the installation instructions for further guidance on deploying MinIO KMS.
Procedure
-
Obtain the your application security vault ID. It is a UUID that’s part of the vault’s URL.
For example,
e5095f4a-8eea-4215-9038-8014442e984c. -
Create a new symmetric encryption key within your Vault under the
Keyssection.MinIO KMS recommends a
AES 256orAES 128key. -
Modify the configuration file for the MinIO KMS cluster
Open the configuration file in your preferred text editor and add the
hsm.hashicorp.vaultsection:version: v1 # Other configuration settings above this line hsm: entrust: keycontrol: server: https://10.1.2.3:443 # KeyControl cluster endpoint vault: e5095f4a-8eea-4215-9038-8014442e984c # KeyControl vault ID key: my-key # Name of the encryption key created above. username: "minkms@example.com" # User account for accessing KeyControl password: "Nh[a7*J)oRbXR$wi74" # Password for the user accountMake the same changes to all MinIO KMS nodes in the cluster deployment. You can then restart the nodes using
systemctl restart minkms. -
(Optional) Disable the local HSM
You can disable the local HSM used to initialize the cluster MinIO KMS after configuring the external HSM. This prevents using that HSM or its associated Root Encryption Key (REK) for accessing the encryption key database.
To disable the local HSM, comment out or remove the
minkms.configuration.hsm.keyvalue from thevalues.yamlfile. -
Update the chart with the new
values.yaml:Use the
helm upgradecommand to upgrade the chart with the newvalues.yaml:helm upgrade minkms minio/minkms \ -n minkms \ -f minkms-values.yaml