Skip to player
Skip to main content
Search
Connect
Watch fullscreen
Like
Bookmark
Share
More
Add to Playlist
Report
36. Vault - Oracle Cloud Infrastructure Foundations
Psycho Killer
Follow
3 days ago
Category
🤖
Tech
Transcript
Display full video transcript
00:00
in this lesson let's look at what is oci vault service so oci vault is a managed service that
00:11
lets you centrally manage encryption keys and secret credential vault removes the need to store
00:18
encryption keys and secrets in configuration files or in code so what are these things called keys
00:24
and secrets a key specifies how to transform plain text into ciphertext during encryption and how to
00:32
transform ciphertext into plain text during decryption secrets are credentials such as
00:39
passwords certificates ssh keys or authentication tokens that you can use with oracle cloud
00:46
infrastructure services so this particular service lets you manage centrally manage these encryption
00:52
keys and credential the idea is you don't have to store that in configuration files or in code
00:57
because that can potentially lead to security breaches so that's the central management aspect
01:02
of keys and secret credentials now there are two kinds of protection modes for keys one is called
01:08
software one is called hardware security modules we have hardware security modules in oci that meets
01:14
fips 140-2 security level 3 certification that's a mouthful that's kind of a federal standard
01:22
for some of these hsm modules but what's the difference between software and these hsm the master
01:29
encryption key protected by an hsm is stored on a hardware security module device and cannot be exported
01:37
from the hsm it stays within the hsm all the cryptographic operations involving the key also happen on the
01:44
hsm meanwhile a master encryption key protected by software is stored on a server and therefore can be
01:51
exported from the server to perform cryptographic operations on the client instead of on the
01:58
server so when i say server here basically it means your compute host or the storage host where the
02:04
remote storage or the object storage gets stored so that's the big difference between hsm and managing
02:11
the keys in hsm versus managing the keys in software now what all different kinds of algorithms
02:17
vault supports let's look into them really quickly so the vault service supports aes rsa and ecdsa
02:25
algorithms what's the difference aes is a symmetric key algorithm the same key encrypts and decrypts data
02:32
rsa is asymmetric encryption so the public key encrypts data and the private key decrypts data ecdsa keys are
02:40
used in digital signing but they cannot be used to encrypt or decrypt data so there are various use cases and
02:46
various both symmetric as well as asymmetric algorithms supported by this particular service
02:51
the keys are integrated with other oci services in the next couple of slides we will look into that
02:57
you can rotate your master keys and that way you don't have to do a complete set of encryption again
03:03
and one thing which is not listed on this slide here if the service is a regional service and it has a
03:09
public api endpoint that you can use now let's look into some of the other basic concepts surrounding
03:16
using the keys so in essence the way vault operates is called envelope encryption it's think about this
03:23
as a two-tiered hierarchy for keys the actual encryption happens with these keys called data encryption keys
03:29
they are used to encrypt customer data and master encryption keys actually encrypt the data keys so you
03:36
can see on the picture here there is the the master key that is used to encrypt the data key and so you
03:43
see that sort of the middle box where the data key is encrypted by the master key but the actual
03:48
encryption for storage let's say it's block storage or object storage or file storage is actually done
03:54
using the data key so this kind of tool tiered encryption is called envelope encryption and you can use im
04:02
policies to authorize access to master keys so not everybody has access to those keys and you could
04:07
also do audit logs to monitor all key related activities so you secure your key vault using those
04:14
things like policies and log audit logs so like i said this is the envelope encryption what are the
04:20
benefits is easier to manage limits the blast radius and the fact that you are using master keys
04:27
it doesn't generate a complete data re-encryption because you could just rotate the master key you
04:32
don't have to do the complete data re-encryption here but one thing to keep in mind is you have
04:38
to be careful if the master key is deleted then there is no way for anyone to recover the data so
04:44
that is why we soft delete the keys with a seven day gap and you should take requisite backups the thing
04:50
to keep in mind is vault cannot be deleted immediately you can schedule the deletion by configuring a
04:56
waiting period like it says on the slide anywhere from 7 to 30 days the vault and all the keys created
05:03
inside the vault are deleted at the end of this waiting period and all the data that was protected
05:08
by those keys is no longer accessible after the vault is deleted keep in mind once a vault is deleted it
05:14
cannot be recovered so that's why that 7 to 30 day period is there by design now let us look at an
05:20
example of how this works with an oci service so here you have a key vault and there is a master key
05:26
in here you can write policies to manage who has access to these keys and you could also do audit
05:32
logs to see who is using these keys now let's look at encryption process and decryption process in the
05:38
context of object storage so let's say you have an object in an object storage bucket you upload some
05:45
plain text data there first thing the service does and you want to encrypt it the encryption is
05:50
actually on by default you could bring your own keys if you don't do that we actually do the
05:55
encryption by default so this is showing how the process actually works so object storage service
06:00
calls the vault service and it asks to generate a data key and the vault service returns a data key
06:08
as well as it returns the data key encrypted with a master key so that's why you see those two
06:13
boxes there and then the object storage takes those keys the data key and it does the encryption
06:20
with the plain text data key and then it throws away the data key but in the bucket it keeps the
06:26
encrypted object in the bucket and it also keeps the encrypted data key with it right so you will see
06:32
why it keeps the encrypted data key when at the time of making a request to decrypt this data the
06:38
encrypted data key data and the encrypted data key are stored as you see that in in the bucket so
06:44
object storage now makes a request to the vault and it sends the encrypted data key as part of the
06:50
request what looks at the encrypted data key it strips out it knows the master key because it is
06:55
stored inside the wall so it strips out the other portion and sends the data key back remember this data
07:01
key is the one which is used for encryption and decryption now once you have the data key you could actually
07:07
decrypt your plain text data with this data key so this is a bit more advanced for a foundational course
07:14
but hopefully you get an idea of how the vault works how this envelope encryption also you know the two
07:21
tiered encryption works and why it is useful because it limits your blast radius and you don't have to
07:28
do encryption again in case you you rotate your keys just to recap vault is a service which you can use
07:35
to centrally manage your keys and secret credentials it has lots of advanced features we just look at
07:40
a couple of quick examples how envelope encryption works i hope this lesson was useful thanks for
07:46
thanks for watching
Be the first to comment
Add your comment
Recommended
3:45
|
Up next
43. Support Rewards - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
5:34
42. Tagging - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
6:52
41. Demo: Cloud Advisor - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
8:06
40. Demo: Cost Management - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
3:25
39. Cost Management - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
4:41
38. Pricing - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
6:38
37. Demo Vault - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
10:12
35. Encryption Basics - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
5:48
34. Demo: Security Zone and Security Advisor - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
3:41
33. Security Zones and Security Advisor - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
8:04
31. Security Introduction - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
4:20
32. Cloud Guard - Oracle Cloud Infrastructure Foundations
Psycho Killer
3 days ago
8:17
29. Demo: Block Volume - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
3:31
30. File Storage - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:19
28. Block Volume - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
5:15
27. Demo: Object Storage - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
7:10
26. Object Storage - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:56
25. Storage Introduction - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:58
24. Serverless with Oracle Functions - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
2:29
23. Container workloads in OCI - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
9:28
22. Oracle Container Engine for Kubernetes (OKE) - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
4:24
21. Scaling - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
11:42
20. Demo: Creating a Compute Instance - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
2:49
19. Demo: Getting Started with Cloud Shell - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
3:46
18. Instance Basics - Oracle Cloud Infrastructure Foundations
Psycho Killer
4 days ago
Be the first to comment