copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2024-10-09 |
frequently asked questions, cryptographic algorithm, regions, pricing, security compliance, key ceremony, critical security parameters, cryptographic module, security Level, fips, performance, capacity |
hs-crypto |
{{site.data.keyword.attribute-definition-list}}
{: #faq-uko}
Read to get answers for questions about {{site.data.keyword.cloud}} {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}}. {: shortdesc}
How many keys can be stored in a {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} instance?
{: #faq-keys-number-uko} {: faq}
A {{site.data.keyword.uko_full_notm}} instance of {{site.data.keyword.hscrypto}} can hold a maximum of 20,000 KMS keys and 20,000 EP11 keys.
{: #faq-uko-differences} {: faq}
Key orchestration brings both key management and key governance capabilities into operations within an enterprise:
- Key management is the people, processes, and technology that define how encryption keys exist and operate within an enterprise, including key lifecycle stages, and roles and duties definitions.
- Key governance is the business control that is defined by the security and risk management practices of an enterprise. Key governance ensures encryption key risks are identified, assessed, and addressed by risk mitigation policies and controls, including applicable regulations and compliance requirements.
- Key orchestration is the activities and means that initiate and manage encryption keys through their lifecycle within an enterprise, including automation and integration into reporting and monitoring.
For more information about key management, see NIST SP 800-57 Part 2 Rev 1 "Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations"{: external}.
Does {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} provide key management, governance, and orchestration at the same time?
{: #faq-uko-functions} {: faq}
Yes. {{site.data.keyword.uko_full_notm}} provides a simplified means of key management, governance, and orchestration: one place to define, operate, and oversee encryption keys across hybrid multicloud environments.
{: #faq-uko-offering} {: faq}
No. From a technology point of view, {{site.data.keyword.uko_full_notm}} is a feature of {{site.data.keyword.hscrypto}}. You need to provision and deploy a {{site.data.keyword.hscrypto}} instance to implement and use {{site.data.keyword.uko_full_notm}}.
How is {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} different from the {{site.data.keyword.hscrypto}} Standard Plan?
{: #faq-uko-hpcs} {: faq}
{{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} extends the Standard Plan. {{site.data.keyword.cloud_notm}} is the only cloud service provider that offers native cloud encryption key orchestration and lifecycle management across hybrid multicloud environments, including {{site.data.keyword.cloud_notm}}, IBM Satellite, other cloud service providers, and on-premises environments. The following table lists the key differences between {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} and {{site.data.keyword.hscrypto}} Standard Plan:
Feature | {{site.data.keyword.hscrypto}} Standard Plan | {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} |
---|---|---|
Multicloud Key Lifecycle Management | Not supported. | Supported. |
Vaults | None. | Unlimited vaults. |
Key types | EP11 keys, root keys, and standard keys. For more information, see Managing EP11 keys with the UI, Creating root keys, and Creating standard keys. | {{site.data.keyword.uko_full_notm}} managed keys. For more information, see Creating managed keys. |
Internal keystores | Unlimited internal keystores and the first 5 keystores are free of charge. For more information, see Pricing sample. | Unlimited internal keystores and the first 5 keystores are free of charge. For more information, see Pricing sample. |
External keystores | Not supported. | Unlimited external keystores. For more information, see Pricing sample. |
Master key rotation | Supported. For more information, see Master key rotation - Standard Plan. | Supported. For more information, see Master key rotation -{{site.data.keyword.uko_full_notm}} Plan. |
EP11 support | Both UI and API support. For more information, see Introducing EP11 over gRPC - Standard Plan. | API support only. |
Viewing associated resources | Supported. For more information, see Viewing associations between root keys and encrypted IBM Cloud resources. | Not supported. |
Dual authorization policies | Supported. For more information, see Managing dual authorization of your service instance. | Not supported. |
KMS key types (policy) | Keys are symmetric 256-bit keys, supported by the AES-CBC algorithm. | Not supported. |
key create and import access policy | Supported. For more information, see Managing the key create and import access policy. | Managed keys are supported through IAM. |
Export keys | Supported. | Not supported. |
{: caption="Key differences between {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} and {{site.data.keyword.hscrypto}} Standard Plan " caption-side="bottom"} |
What type of HSM is used for {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}}?
{: #faq-uko-fips} {: faq}
{{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} is built on the FIPS 140-2 Level 4 certified HSM as the {{site.data.keyword.hscrypto}} Standard Plan.
Which cloud vendors or providers are supported by {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} as connected external keystores?
{: #faq-uko-vendor-cloud} {: faq}
The following list contains a few cloud providers:
- Keystores of another {{site.data.keyword.hscrypto}} instance
- Keystores of {{site.data.keyword.keymanagementservicefull}}
- Keystores of {{site.data.keyword.keymanagementservicefull}} on Satellite
- Microsoft Azure Key Vault
- AWS Key Management Service
- Google Cloud Key Management Service
{: #faq-uko-ekmf} {: faq}
IBM® Enterprise Key Management Foundation - Web Edition (EKMF Web) and {{site.data.keyword.uko_full_notm}} share the same code base.
EKMF Web is an on-premises product for IBM Z14 or Z15 environments, running z/OS V2.3 or z/OS V2.4 and IBM Db2. {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} is a cloud native service in IBM Cloud, which offers key management and orchestration in a hybrid multicloud environment.
What multizone regions is {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} available in?
{: #faq-uko-mzr} {: faq}
{{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} is available in all regions where {{site.data.keyword.hscrypto}} is available. Refer to Regions and locations for a list of available regions of {{site.data.keyword.hscrypto}}.
Can I still use {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}} for key management even if {{site.data.keyword.hscrypto}} is not available in the {{site.data.keyword.cloud_notm}} region that my service resides in?
{: #faq-uko-region} {: faq}
Yes. You can choose a data center within your required data residency region and use {{site.data.keyword.uko_full_notm}} in any regions where {{site.data.keyword.hscrypto}} is available. Note that your encryption keys is managed in the regions where your {{site.data.keyword.hscrypto}} instances are available.
How many keystores can be created for an instance of {{site.data.keyword.hscrypto}} with {{site.data.keyword.uko_full_notm}}?
{: #faq-uko-keystore-number} {: faq}
There is an internal KMS keystore limit of 50, but there is no external keystore limit. For more information on how the keystores are charged, see the pricing sample.