選取您的 Cookie 偏好設定

我們使用提供自身網站和服務所需的基本 Cookie 和類似工具。我們使用效能 Cookie 收集匿名統計資料,以便了解客戶如何使用我們的網站並進行改進。基本 Cookie 無法停用,但可以按一下「自訂」或「拒絕」以拒絕效能 Cookie。

如果您同意,AWS 與經核准的第三方也會使用 Cookie 提供實用的網站功能、記住您的偏好設定,並顯示相關內容,包括相關廣告。若要接受或拒絕所有非必要 Cookie,請按一下「接受」或「拒絕」。若要進行更詳細的選擇,請按一下「自訂」。

Use AMS SSP to provision AWS CloudHSM in your AMS account

焦點模式
Use AMS SSP to provision AWS CloudHSM in your AMS account - AMS Advanced User Guide
此頁面尚未翻譯為您的語言。 請求翻譯

Use AMS Self-Service Provisioning (SSP) mode to access AWS CloudHSM capabilities directly in your AMS managed account. AWS CloudHSM helps you meet corporate, contractual, and regulatory compliance requirements for data security by using dedicated Hardware Security Module (HSM) instances within the AWS cloud. AWS, and AWS Marketplace partners, offer a variety of solutions for protecting sensitive data within the AWS platform, but for some applications and data subject to contractual or regulatory mandates for managing cryptographic keys, additional protection may be necessary. AWS CloudHSM complements existing data protection solutions and allows you to protect your encryption keys within HSMs that are designed and validated to government standards for secure key management. AWS CloudHSM allows you to securely generate, store, and manage cryptographic keys used for data encryption in a way that keys are accessible only by you. To learn more, see AWS CloudHSM.

AWS CloudHSM in AWS Managed Services FAQs

Common questions and answers:

Q: How do I request access to AWS CloudHSM in my AMS account?

Utilization of in your AMS account is a two-step process:

  1. Request an AWS CloudHSM cluster. Do this by submitting an RFC with the Management | Other | Other | Create (ct-1e1xtak34nx76) change type. Include the following details:

    • AWS Region.

    • VPC ID/ARN. Provide a VPC ID/VPC ARN that is in the same account as the RFC that you submit.

    • Specify at least two Availability Zones for the cluster.

    • Amazon EC2 instance ID that will connect to the HSM cluster.

  2. Access the AWS CloudHSM console. Do this by submitting an RFC with the Management | AWS service | Self-provisioned service | Add (ct-1w8z66n899dct) change type. This RFC provisions the following IAM role to your account: customer_cloudhsm_console_role.

After the role is provisioned in your account, you must onboard it in your federation solution.

Q: What are the restrictions to using AWS CloudHSM in my AMS account?

Access to the AWS CloudHSM console doesn't provide you with the ability to create, terminate or restore your cluster. To do those things, submit a Management | Other | Other | Create change type (ct-1e1xtak34nx76) change type.

Q: What are the prerequisites or dependencies to using AWS CloudHSM in my AMS account?

You must allow TCP traffic using port 2225 through a client Amazon EC2 instance within a VPC, or use Direct Connect VPN for on-premise servers that want access to the HSM cluster. AWS CloudHSM is dependent on Amazon EC2 for security groups and network interfaces. For log monitoring or auditing, HSM relies on CloudTrail (AWS API operations) and CloudWatch Logs for all local HSM device activity.

Q: Who will apply updates to the AWS CloudHSM client and related software libraries?

You are responsible for applying the library and client updates. You'll want to monitor the CloudHSM version history page for releases, and then apply updates using the CloudHSM client upgrade.

Note

Software patches for the HSM appliance are always automatically applied by the AWS CloudHSM service.

在本頁面

下一個主題:

AWS CodeBuild

上一個主題:

AWS CloudEndure
隱私權網站條款Cookie 偏好設定
© 2025, Amazon Web Services, Inc.或其附屬公司。保留所有權利。