To use a Key Management Service (KMS) hardware key management instance, you must connect it to a Cloud Hardware Security Module (CloudHSM) cluster. A CloudHSM cluster provides automatic data synchronization, load balancing, and high availability. This topic describes how to configure a CloudHSM cluster for a KMS hardware key management instance.
Architecture example
Integrating KMS with a CloudHSM cluster combines the flexibility of key management with hardware-level security. This integration meets compliance requirements such as China's SM standards or FIPS 140-2 Level 3. KMS manages keys and ensures that their lifecycles are strictly controlled, which reduces the complexity of using HSMs. The HSMs use hardware-level security to securely store key material. The communication between KMS and the CloudHSM cluster uses a bidirectional Transport Layer Security (TLS) authenticated encryption channel to ensure secure transmission.
The HSM management tool can be installed only on an Alibaba Cloud Elastic Compute Service (ECS) instance. Therefore, you must deploy an ECS instance in the virtual private cloud (VPC) subnet of the master HSM. You can then use the ECS instance to connect to the master HSM and perform configurations. You can also use a local terminal to perform configurations, but you must make sure that the terminal can connect to the HSM network.
Notes
A KMS hardware key management instance can be associated only with a General-purpose HSM.
The HSMs, the KMS hardware key management instance, and the ECS instance must be deployed in the same region and the same VPC.
To manage HSMs in the Chinese mainland, the ECS instance must run a Windows operating system. To manage HSMs outside the Chinese mainland, the ECS instance must run a CentOS 8 or Alibaba Cloud Linux operating system.
Supported regions and zones for HSMs
The Chinese mainland
Region
Region ID
Zone
China (Hangzhou)
cn-hangzhou
Zone A, Zone G
China (Shanghai)
cn-shanghai
Zone A, Zone B, Zone F
China (Beijing)
cn-beijing
Zone A, Zone F, Zone K
China (Shenzhen)
cn-shenzhen
Zone A, Zone E
China (Chengdu)
cn-chengdu
Zone A, Zone B
Outside the Chinese mainland
Region
Region ID
Zone
China (Hong Kong)
cn-hongkong
Zone B, Zone C
Singapore
ap-southeast-1
Zone A, Zone B
Malaysia (Kuala Lumpur)
ap-southeast-3
Zone A, Zone B
SAU (Riyadh - Partner Region)
me-central-1
Zone A, Zone B
Indonesia (Jakarta)
ap-southeast-5
Zone A, Zone B
Prerequisites
A VPC is created, and a vSwitch is created in two different zones. For more information, see Create a VPC and vSwitches.
An ECS instance is created in the same VPC as the master HSM. For more information, see Create an instance using the wizard.
NoteTo manage HSMs in the Chinese mainland, the ECS instance must run a Windows operating system. To manage HSMs outside the Chinese mainland, the ECS instance must run a CentOS 8 or Alibaba Cloud Linux operating system.
This topic uses an ECS instance as an example. You can also use a local terminal to manage the HSM. If you use a local terminal, you must connect it to the VPC that contains the HSM using a VPN or an Express Connect circuit. For more information, see Connect a client to a VPC using an SSL-VPN connection or Connect an on-premises IDC to a VPC using an Express Connect circuit.
Configure a GVSM (Guomi) HSM cluster
Step 2: Synchronize cluster data
Configure a FIPS-compliant HSM cluster
Step 2: Enable the HSM instance
Step 3: Create and activate a cluster
What to do next
Go to the KMS console to purchase a KMS hardware key management instance and complete the required configurations. For more information, see Purchase and enable a KMS instance.

During synchronization, the cluster status is Syncing.
