AWS encryption services - keys, HSMs, and certificates
Three AWS encryption services that solve different problems: KMS for managed key management, CloudHSM for dedicated hardware security modules, and ACM for TLS certificate management. KMS protects data at rest, ACM protects data in transit, and CloudHSM provides single-tenant HSMs with full key control.
Integrated with 100+ AWS services, envelope encryption
FIPS 140-3 Level 3, single-tenant, you control the keys
Free TLS certs with auto-renewal for CloudFront, ALB, API GW
| Criteria | KMS | CloudHSM | ACM |
|---|---|---|---|
| Primary Purpose | Encrypt data at rest (keys for S3, EBS, RDS, etc.) | Single-tenant HSM for custom crypto (PKCS#11, JCE) and direct key control | Encrypt data in transit (TLS certificates) |
| FIPS 140-3 Level | Level 3 (since Feb 2025) | Level 3 (single-tenant, dedicated hardware) | N/A (uses KMS or CloudHSM internally) |
| Key Control | AWS manages HSM and key material; you manage key policies, grants, and rotation | You manage HSM users, key material, and crypto operations; AWS manages hardware only | AWS manages certificate private keys |
| Key Export | Not possible (keys never leave HSM in plaintext) | Yes (wrap and export key material) | Not possible (private keys managed by AWS) |
| Automatic Rotation | Yes (configurable: 90-2560 days for customer-managed, annual for AWS-managed) | Manual | Yes (auto-renewal before expiry) |
| Integrations | S3, EBS, RDS, Lambda, 100+ services | Custom apps (PKCS#11, JCE) | CloudFront, ALB, API Gateway, Elastic Beanstalk |
| Multi-Region | Yes (multi-region keys with shared key material) | No (per-cluster) | No (separate cert per region; CloudFront uses us-east-1 globally) |
| Cost | $1/key/month | ~$1,058/HSM/month | Free (public) |
| Post-Quantum Ready | Yes (NIST PQC algorithms, re:Invent 2025) | Custom (you can load PQC algorithms into your HSM) | Yes (CloudFront PQ TLS, re:Invent 2025) |
KMS = data at rest (encryption keys for S3, EBS, RDS). ACM = data in transit (TLS certificates for ALB, CloudFront). You need both for a fully encrypted architecture.
Since Feb 2025, KMS is also FIPS 140-3 Level 3. Choose CloudHSM when you need single-tenant dedicated hardware, PKCS#11/JCE interfaces, direct key export, or custom cryptographic operations. KMS is sufficient for most compliance requirements.
re:Invent 2025 announced NIST-standardized post-quantum algorithms in KMS, CloudFront, Private CA, and Secrets Manager. Start planning migration for long-lived data.
KMS keys never leave the HSM boundary in plaintext. This is a security feature, not a limitation. If you need exportable keys, use CloudHSM or KMS external key stores.
These comparisons are a starting point. Every architecture is different. Contact us for tailored AWS security assessments and architectural guidance.