Creating a new HSM using the AWS Console

You can use the AWS Console - available online - to create a new HSM for generating encryption keys. To complete this process you will require login credentials for the AWS Console.

There are nine steps to create a new HSM:

  1. Create a VPC (Virtual Private Cloud).
  2. Create subnets under the VPC.
  3. Create an Internet Gateway.
  4. Create route tables per subnet.
  5. Create, initialise, and activate the HSM.
  6. Create security groups.
  7. Create the EC2 instance.
  8. Activate the HSM.
  9. Code configuration.

A VPC is basically a virtual network. The CloudHSM deployment resources will be created under this network. To create a VPC:

  1. Open the AWS console.
  2. Log in.
  3. Click VPCs.
  4. Select the Create VPC option.
  5. Provide an IP range for the network. At a later point you will split this network into subnetworks (at least 2), so make sure that you provide a sufficiently wide range for the IP addresses - for example, 10.0.0.0/16 should be fine.

For the CloudHSM to work, you need to create at least 2 subnets under the VPC (according to the AWS documentation). These subnets will split the network into different groups.

To create subnets under the VPC:

  1. Click Create subnet.

  2. Provide the VPC - use the one already created.

  3. Provide an Availability Zone (AZ), which determines where the subnet will reside. Choose one for now, but make sure that the two subnets are in different AZs.

  4. Provide the IP range for the subnet. This should be a subset of the VPC’s range (for example, 10.0.0.0/19).

  5. Once this subnet is created, repeat the steps above to create a second one with another IP subset of the VPC’s range (for example, 10.0.128.0/20).

An Internet Gateway enables communication between your VPC and the outside world (Internet).

At this stage of the setup, there are two subnets. They are in the same VPC so they can communicate with each other. As a result, only one of them needs to allow an SSH connection.

To create an Internet Gateway:

  1. In the AWS console, go to Internet Gateways.
  2. Create a new Internet Gateway with a new name.
  3. Attach it to the VPC created earlier.

A route table is required for each subnet. One of these route tables needs an explicit routing configuration - the rest can use the default settings.

By default, a route table is configured to have the VPC’s IP range as Destination, and the local IP range as Target. To ensure access to one of the subnets, add a new row that specifies Destination as your public IP (or 0.0.0.0/32 for all IPs), and Target as the newly created Internet Gateway.

Leave the default settings for the rest of the route tables, and attach them to the subnets under the Subnets menu.

  1. Go to CloudHSM console.
  2. Create a cluster.
  3. For VPC, provide the VPC created earlier.
  4. For AZ, provide the subnet that does not have public access! This is important because the cluster should be accessible from the other subnet only, not from the Internet.
  5. To proceed further, follow the Official AWS documentation from the Create an HSM step onward.
  6. This stage of the process is complete when the cluster UI shows Initialized.

Security groups are used when EC2 Instances are created for subnets. When creating HSM clusters, the connection on ports 2223 to 2225 will be open. These ports will be used from the other subnet (the public one) to connect. In addition, you must create one more Security Group where:

  1. Port 22 is opened for a SSH connection.
  2. Type is set to SSH.
  3. Protocol is set to TCP.
  4. Source can be set to 0.0.0.0/0.

Type should be SSH, Protocol should be TCP and Source can be 0.0.0.0/0

At this stage of the setup, you need to create an EC2 instance so that you can access the public subnet via this EC2 instance through SSH.

To do so:

  1. Open the EC2 management console on AWS.
  2. Click Instances.
  3. Click Launch Instance.
  4. Select an instance type - for example, Amazon Linux.
  5. Set VPC to be the VPC you created.
  6. Set Subnet ID to be the PUBLIC SUBNET you configured.
  7. Set Security Groups to the one using SSH, and the one that the cluster created (its name is typically cloudhsm-<clusterid>). IMPORTANT: You must create an EC2 (virtual machine) for the PUBLIC SUBNET only! The PRIVATE SUBNET (which runs the HSM cluster) must be left as is - it is accessed via this machine.
  8. When prompted, create a new key. Make sure that you download and save it - it is the only way to SSH to the box.
  9. Launch the new EC2 instance.
  10. Click Connect.
  11. Run a command in the format shown below (replace the <keyFile> and <publicIp> placeholder parts):
    ssh -i "<keyFile>.pem" ec2-user@<publicIp>
    
  12. You are now connected. In case of an error, make sure that the security groups, Internet Gateway, and routing are in place, and try again.

The last stage in the setup process is to download the HSM tools.

To do so:

  1. Run the following command:
wget https://s3.amazonaws.com/cloudhsmv2-software/CloudHsmClient/EL6/cloudhsm-client-latest.el6.x86_64.rpm
  1. Then run:
sudo yum install -y ./cloudhsm-client-latest.el6.x86_64.rpm
  1. The CloudHSM utility has now been created. At this point you need to find out the IP of the HSM instance. To do so, open the HSM console on the AWS UI and copy the ENI IP address.

  2. Configure the utility by running:

sudo /opt/cloudhsm/bin/configure -a <ENI IP address>
  1. Your customerCA.crt key file still needs to be copied to the EC2 instance. The CloudHSM utility will look for this key file in the /opt/cloudhsm/etc/ directory, however you do not have direct access to it.

    5.1. First copy the customerCA.crt key file to your home directory:

    scp -i "<keyFile>.pem" customerCA.crt ec2-user@<publicIp>:~/
    

    5.2. Then copy it to the /opt directory using sudo:

    sudo cp customerCA.crt /opt/cloudhsm/etc/customerCA.crt
    
  2. The CloudHSM utility should start up with console output like the one in the example below:

[ec2-user@ip-10-0-3-174 ~]$ /opt/cloudhsm/bin/cloudhsm_mgmt_util /opt/cloudhsm/etc/cloudhsm_mgmt_util.cfg
Ignoring E2E enable flag in the configuration file
Connecting to the server(s), it may take time
depending on the server(s) load, please wait...
Connecting to server '10.0.140.211': hostname '10.0.140.211', port 2225...
Connected to server '10.0.140.211': hostname '10.0.140.211', port 2225.
E2E enabled on server 0(10.0.140.211)
  1. Change your password, as advised in https://docs.aws.amazon.com/cloudhsm/latest/userguide/manage-hsm-users.html.

The AmazonCloudHsmCryptoService class implements the communication with the CloudHSM cluster. The configuration must include your credentials for the given cluster: a CU type user name, a password, and the partition name. In addition, a local certificate store must be present since CloudHSM does not store certificates due to safety precautions.

The relevant parts of an example PKI Tool configuration is shown below for reference:

   hsmLibraries = [
       {
           type = AMAZON_CLOUD_HSM
           jars = ["/opt/cloudhsm/java/cloudhsm-3.2.1.jar"]
           sharedLibDir = "/opt/cloudhsm/lib"
       }
   ]
   keyStores = {
       "example-hsm-key-store" = {
           type = AMAZON_CLOUD_HSM
           credentialsAmazon = {
                   partition = "<partition_name>"
                   userName = "<user_name>"
                   password = "<password>"
           }
   	localCertificateStore = {
                   file = "./certificate-store2.jks"
                   password = "password"
           }
       }
   }
   certificates = {
       "cordatlscrlsigner" = {
           isSelfSigned = true
           subject = "CN=Test TLS Signer Certificate, OU=HQ, O=HoldCo LLC, L=New York, C=U"
           includeIn = ["network-trust-store", "certificate-store"]
           crl = {
               crlDistributionUrl = "http://127.0.0.1:10000/certificate-revocation-list/tls"
               file = "./crl-files/tls.crl"
               indirectIssuer = true
               issuer = "CN=Test TLS Signer Certificate, OU=HQ, O=HoldCo LLC, L=New York, C=U"
           }
           key = {
               alias = "cordatlscrlsigner"
               includeIn = ["example-hsm-key-store"]
               type = AMAZON_CLOUD_HSM
           }
       }
   }

To find the partition name, log in the EC2 machine, run:

/opt/cloudhsm/bin/cloudhsm_mgmt_util /opt/cloudhsm/etc/cloudhsm_mgmt_util.cfg

Log in the admin account with listUsers and then loginHSM.

Get the cluster info:

aws-cloudhsm>getClusterInfo
Cluster info from server 0(10.0.140.211):
Node IdHostnamePort
110.0.140.2112225

The server ID will be “server X” - in this case, server 0. Call info on the server:

info server X
aws-cloudhsm>info server 0
IdNameHostnamePortStatePartitionLoginState
110.0.140.2110.0.140.2112225Connectedhsm-w4b6nnfio7zNot logged in

To list the users in the tool:

aws-cloudhsm>listUsers
Users on server 0(10.0.140.211):
Number of users found:5
User IdUser TypeMofnPubKeyLoginFailureCnt2FA
1COadmin0NO
2AUapp_user0NO
3AUtest0NO
4CUtest20NO

Was this page helpful?

Thanks for your feedback!

Chat with us

Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.

Propose documentation improvements directly

Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.

We're sorry this page wasn't helpful. Let us know how we can make it better!

Chat with us

Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.

Create an issue

Create a new GitHub issue in this repository - submit technical feedback, draw attention to a potential documentation bug, or share ideas for improvement and general feedback.

Propose documentation improvements directly

Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.