Setting cache security thresholds
When you implement data key caching, you need to configure the security thresholds that the caching CMM enforces.
The security thresholds help you to limit how long each cached data key is used and how much data is protected under each data key. The caching CMM returns cached data keys only when the cache entry conforms to all of the security thresholds. If the cache entry exceeds any threshold, the entry is not used for the current operation and it is evicted from the cache as soon as possible. The first use of each data key (before caching) is exempt from these thresholds.
As a rule, use the minimum amount of caching that is required to meet your cost and performance goals.
The AWS Encryption SDK only caches data keys that are encrypted by using a key derivation function
For examples of setting cache security thresholds, see AWS Encryption SDK: How to Decide if Data Key Caching is Right for Your Application
Note
The caching CMM enforces all of the following thresholds. If you do not specify an optional value, the caching CMM uses the default value.
To disable data key caching temporarily, the Java and Python implementations of the
AWS Encryption SDK provide a null cryptographic materials cache (null cache). The
null cache returns a miss for every GET
request and does not respond to
PUT
requests. We recommend that you use the null cache instead of setting the
cache capacity or security thresholds to 0. For more
information, see the null cache in Java
- Maximum age (required)
-
Determines how long a cached entry can be used, beginning when it was added. This value is required. Enter a value greater than 0. The AWS Encryption SDK does not limit the maximum age value.
All language implementations of the AWS Encryption SDK define the maximum age in seconds, except for the AWS Encryption SDK for JavaScript, which uses milliseconds.
Use the shortest interval that still allows your application to benefit from the cache. You can use the maximum age threshold like a key rotation policy. Use it to limit reuse of data keys, minimize exposure of cryptographic materials, and evict data keys whose policies might have changed while they were cached.
- Maximum messages encrypted (optional)
-
Specifies the maximum number of messages that a cached data key can encrypt. This value is optional. Enter a value between 1 and 2^32 messages. The default value is 2^32 messages.
Set the number of messages protected by each cached key to be large enough to get value from reuse, but small enough to limit the number of messages that might be exposed if a key is compromised.
- Maximum bytes encrypted (optional)
-
Specifies the maximum number of bytes that a cached data key can encrypt. This value is optional. Enter a value between 0 and 2^63 - 1. The default value is 2^63 - 1. A value of 0 lets you use data key caching only when you are encrypting empty message strings.
The bytes in the current request are included when evaluating this threshold. If the bytes processed, plus current bytes, exceed the threshold, the cached data key is evicted from the cache, even though it might have been used on a smaller request.