Amazon S3 Express One Zone now supports AWS KMS with customer managed keys
Amazon S3 Express One Zone, a high-performance, single-Availability Zone (AZ) S3 storage class, now supports server-side encryption with AWS Key Management Service (KMS) keys (SSE-KMS). S3 Express One Zone already encrypts all objects stored in S3 directory buckets with Amazon S3 managed keys (SSE-S3) by default. Starting today, you can use AWS KMS customer managed keys to encrypt data at rest, with no impact on performance. This new encryption capability gives you an additional option to meet compliance and regulatory requirements when using S3 Express One Zone, which is designed to deliver consistent single-digit millisecond data access for your most frequently accessed data and latency-sensitive applications.
S3 directory buckets allow you to specify only one customer managed key per bucket for SSE-KMS encryption. Once the customer managed key is added, you cannot edit it to use a new key. On the other hand, with S3 general purpose buckets, you can use multiple KMS keys either by changing the default encryption configuration of the bucket or during S3 PUT requests. When using SSE-KMS with S3 Express One Zone, S3 Bucket Keys are always enabled. S3 Bucket Keys are free and reduce the number of requests to AWS KMS by up to 99%, optimizing both performance and costs.
Using SSE-KMS with Amazon S3 Express One Zone
To show you this new capability in action, I first create an S3 directory bucket in the Amazon S3 console following the steps to create a S3 directory bucket and use apne1-az4 as the Availability Zone. In Base name, I enter s3express-kms and a suffix that includes the Availability Zone ID wich is automatically added to create the final name. Then, I select the checkbox to acknowledge that Data is stored in a single Availability Zone.
In the Default encryption section, I choose Server-side encryption with AWS Key Management Service keys (SSE-KMS). Under AWS KMS Key I can Choose from your AWS KMS keys, Enter AWS KMS key ARN, or Create a KMS key. For this example, I previously created an AWS KMS key, which I selected from the list, and then choose Create bucket.
Now, any new object I upload to this S3 directory bucket will be automatically encrypted using my AWS KMS key.
SSE-KMS with Amazon S3 Express One Zone in action
To use SSE-KMS with S3 Express One Zone via the AWS Command Line Interface (AWS CLI), you need an AWS Identity and Access Management (IAM) user or role with the following policy . This policy allows the CreateSession API operation, which is necessary to successfully upload and download encrypted files to and from your S3 directory bucket.
{ “Version”: “2012-10-17”, “Statement”: [ { “Effect”: “Allow”, “Action”: [ “s3express:CreateSession” ], “Resource”: [ “arn:aws:s3express:*:
With the PutObject command, I upload a new file named confidential-doc.txt to my S3 directory bucket.
aws s3api put-object –bucket s3express-kms–apne1-az4–x-s3 –key confidential-doc.txt –body confidential-doc.txt
As a success of the previous command I receive the following output:
{ “ETag”: “”664469eeb92c4218bbdcf92ca559d03b””, “ChecksumCRC32”: “0duteA==”, “ServerSideEncryption”: “aws:kms”, “SSEKMSKeyId”: “arn:aws:kms:ap-northeast-1:
Checking the object’s properties with HeadObject command, I see that it’s encrypted using SSE-KMS with the key that I created before:
aws s3api head-object –bucket s3express-kms–apne1-az4–x-s3 –key confidential-doc.txt
I get the following output:
{ “AcceptRanges”: “bytes”, “LastModified”: “2024-08-21T15:29:22+00:00”, “ContentLength”: 5, “ETag”: “”664469eeb92c4218bbdcf92ca559d03b””, “ContentType”: “binary/octet-stream”, “ServerSideEncryption”: “aws:kms”, “Metadata”: {}, “SSEKMSKeyId”: “arn:aws:kms:ap-northeast-1:
I download the encrypted object with GetObject:
aws s3api get-object –bucket s3express-kms–apne1-az4–x-s3 –key confidential-doc.txt output-confidential-doc.txt
As my session has the necessary permissions, the object is downloaded and decrypted automatically.
{ “AcceptRanges”: “bytes”, “LastModified”: “2024-08-21T15:29:22+00:00”, “ContentLength”: 5, “ETag”: “”664469eeb92c4218bbdcf92ca559d03b””, “ContentType”: “binary/octet-stream”, “ServerSideEncryption”: “aws:kms”, “Metadata”: {}, “SSEKMSKeyId”: “arn:aws:kms:ap-northeast-1:
For this second test, I use a different IAM user with a policy that is not granted the necessary KMS key permissions to download the object. This attempt fails with an AccessDenied error, demonstrating that the SSE-KMS encryption is functioning as intended.
An error occurred (AccessDenied) when calling the CreateSession operation: Access Denied
This demonstration shows how SSE-KMS works seamlessly with S3 Express One Zone, providing an additional layer of security while maintaining ease of use for authorized users.
Things to know
Getting started – You can enable SSE-KMS for S3 Express One Zone using the Amazon S3 console, AWS CLI, or AWS SDKs. Set the default encryption configuration of your S3 directory bucket to SSE-KMS and specify your AWS KMS key. Remember, you can only use one customer managed key per S3 directory bucket for its lifetime.
Regions – S3 Express One Zone support for SSE-KMS using customer managed keys is available in all AWS Regions where S3 Express One Zone is currently available.
Performance – Using SSE-KMS with S3 Express One Zone does not impact request latency. You’ll continue to experience the same single-digit millisecond data access.
Pricing – You pay AWS KMS charges to generate and retrieve data keys used for encryption and decryption. Visit the AWS KMS pricing page for more details. In addition, when using SSE-KMS with S3 Express One Zone, S3 Bucket Keys are enabled by default for all data plane operations except for CopyObject and UploadPartCopy, and can’t be disabled. This reduces the number of requests to AWS KMS by up to 99%, optimizing both performance and costs.
AWS CloudTrail integration – You can audit SSE-KMS actions on S3 Express One Zone objects using AWS CloudTrail. Learn more about that in my previous blog post.
– Eli.