Step 4: Import the key material
After you encrypt your key
material, you can import the key material to use with an Amazon KMS key. To import key
material, you upload the encrypted key material from Step 3: Encrypt the
key material and the import token that you downloaded
at Step 2:
Download the wrapping public key and import token. You must import key material into
the same KMS key that you specified when you downloaded the public key and import
token. When key material is successfully imported, the key
state of the KMS key changes to Enabled, and you can use the KMS key
in cryptographic operations.
When you import key material, you can set an optional expiration time for the key material. When the key material expires, Amazon KMS deletes the key material and the KMS key becomes unusable. After you import your key material, you cannot set, change, or cancel the expiration date for the current import. To change these values, you must reimport the same key material.
For all KMS keys with EXTERNAL origin, the first key material imported
into it becomes current and permanently associated with it. Symmetric encryption keys with
EXTERNAL origin support on-demand rotation. You can associate multiple key materials
with imported keys that support on-demand rotation. The process for importing new key material
differs for single-Region and multi-Region keys as described in the section
Import new key material. You must set the
importType parameter to NEW_KEY_MATERIAL with the ImportKeyMaterial action to
associate new key material with a KMS key. The default value of the optional
ImportType parameter is EXISTING_KEY_MATERIAL. When
you omit the ImportType parameter or specify it as
EXISTING_KEY_MATERIAL, you must import a key material that is previously
associated with the KMS key.
For asymmetric, or HMAC KMS keys with EXTERNAL origin,
only one key material can ever be associated with the key. Amazon KMS will reject ImportKeyMaterial API requests
with the ImportType parameter.
When all key materials permanently associated with a KMS key are imported, the
KMS key is available for use in cryptographic operations. If any one of these key materials
is deleted or allowed to expire, the KMS key state changes to PendingImport and
the key is unusable for cryptographic operations.
To import key material, you can use the Amazon KMS console or the ImportKeyMaterial API. You can use the
API directly by making HTTP requests, or by using an Amazon SDKs
When you import the key material, an ImportKeyMaterial
entry is added to your Amazon CloudTrail log to record the ImportKeyMaterial
operation. The CloudTrail entry is the same whether you use the Amazon KMS console or the Amazon KMS API.
Setting an expiration time (optional)
When you import the key material for your KMS key, you can set an optional expiration
date and time for the key material of up to 365 days from the import date. When imported key
material expires, Amazon KMS deletes it. This action changes the key state of the KMS key to PendingImport, which prevents it from
being used in any cryptographic operation. To use the KMS key, you must reimport a copy of the original key material.
Ensuring that imported key material expires frequently can help you to satisfy regulatory requirements, but it introduces an additional a risk to data encrypted under the KMS key. Until you reimport a copy of the original key material, a KMS key with expired key material is unusable, and any data encrypted under the KMS key is inaccessible. If you fail to reimport the key material for any reason, including losing your copy of the original key material, the KMS key is permanently unusable, and data encrypted under the KMS key is unrecoverable.
To mitigate this risk, make sure that your copy of the imported key material is accessible, and design a system to delete and reimport the key material before it expires and interrupts your Amazon workload. We recommend that you set an alarm for the expiration of your imported key material that gives you plenty of time to reimport the key material before it expires. You can also use your CloudTrail logs to audit operations that import (and reimport) key material and delete imported key material, and the Amazon KMS operation to delete expired key material.
Amazon KMS cannot restore, recover, or reproduce the deleted key material. Instead of setting an expiration time, you can programmatically delete and reimport the imported key material periodically, but the requirements for retaining a copy of the original key material are the same.
You determine whether and when imported key material expires when you import the key
material. However you can turn expiration on and off, or set a new expiration time by
reimporting the key material. Use the ExpirationModel parameter of ImportKeyMaterial to turn expiration
on (KEY_MATERIAL_EXPIRES) and off (KEY_MATERIAL_DOES_NOT_EXPIRE) and
the ValidTo parameter to set the expiration time. The maximum time is 365 days
from the import data; there is no minimum, but the time must be in the future.
Set key material description
Symmetric encryption keys with EXTERNAL origin can have multiple key
materials associated with them. You can specify an optional key material description when
importing key material into such keys. The description can be used to keep track of where the
corresponding key material is durably maintained outside Amazon KMS.
For multi-Region keys, you can set or change the key material description only on the primary Region key. Amazon KMS automatically propagates the key material description to replica Region keys.
Import new key material
To perform on-demand rotation on a symmetric encryption KMS key with imported key material, you'll first need to import new key material, not previously associated with the key.
-
Single Region keys
-
Use the ImportKeyMaterial operation with the
ImportTypeparameter set toNEW_KEY_MATERIALto accomplish this task. This key material is not permanently associated with the key until you perform the RotateKeyOnDemand operation or rotate the key in the Amazon Web Services Management Console. Until then, this key material is inPENDING_ROTATIONstate. A KMS key can have at most one key material inPENDING_ROTATIONstate at any time. A key material inPENDING_ROTATIONstate can be deleted without impacting the key's usability in cryptographic operations.
-
-
Multi-Region keys
-
To import key material into a multi-Region key, you must first import the new key material to the primary Region key. You cannot directly import new key materials to replica Region keys. After importing new key material to the primary Region key, you can import the same key materials into the replica Region keys.
-
Use the
ImportKeyMaterialoperation with theImportTypeparameter set toNEW_KEY_MATERIALfor the primary Region key to accomplish this task. For the replica Region key, use theEXISTING_KEY_MATERIALparameter forImportTypefor theImportKeyMaterialoperation. -
The key material for symmetric-encryption multi-Region keys must be imported into all the replica Region keys and primary Region keys before the key material state changes to
PENDING_ROTATIONstate. Until then, the state of the new key material isPENDING_MULTI_REGION_IMPORT_AND_ROTATION. A KMS key can have at most one key material inPENDING_ROTATIONorPENDING_MULTI_REGION_IMPORT_AND_ROTATIONstate at any time (see theKeyMaterialStatedescription in RotationsListEntry). A key material inPENDING_MULTI_REGION_IMPORT_AND_ROTATIONorPENDING_ROTATIONstate is not permanently associated with the key and can be deleted without impacting the key's usability in cryptographic operations.
-
Reimport key material
If you manage a KMS key with imported key material, you might need to reimport the key material. You might reimport key material to replace expiring or deleted key material, or to change the expiration model or expiration date of the key material.
You can reimport key material at any time, on any schedule that meets your security requirements. You do not have to wait until the key material is at or close to its expiration time.
The procedure to reimport key material is the same procedure that you use to import the key material the first time, with the following exceptions.
-
Use an existing KMS key, instead of creating a new KMS key. You can skip Step 1 of the import procedure.
-
When you reimport key material, you can change the expiration model and expiration date. For symmetric encryption keys, you can also change the key material description.
For multi-Region keys, you can set or change the key material description only on the primary Region key. Amazon KMS automatically propagates the key material description to replica Region keys.
Each time you import key material to a KMS key, you need to download and use a new wrapping key and import token for the KMS key. The wrapping procedure does not affect the content of the key material, so you can use different wrapping public keys and different wrapping algorithms to import the same key material.
Import key material (console)
You can use the Amazon Web Services Management Console to import key material.
-
If you are on the Upload your wrapped key material page, skip to Step 10.
-
Sign in to the Amazon Web Services Management Console and open the Amazon Key Management Service (Amazon KMS) console at https://console.amazonaws.cn/kms
. -
To change the Amazon Web Services Region, use the Region selector in the upper-right corner of the page.
-
In the navigation pane, choose Customer managed keys.
-
Choose the key ID or alias of the KMS key for which you downloaded the public key and import token.
-
Choose the Cryptographic configuration tab and view its values. The tabs are on the detail page for a KMS key below the General configuration section.
You can only import key material into KMS keys with an Origin of External (Import key material). For information about creating KMS keys with imported key material, see Importing key material for Amazon KMS keys.
-
Choose the appropriate tab based on your key type.
-
For asymmetric and HMAC keys, choose the Key material tab.
-
For symmetric encryption keys, choose the Key material and rotations tab.
-
-
Choose the import action.
-
For asymmetric and HMAC keys, choose Import key material.
-
For symmetric encryption keys, choose one of the following:
-
Import initial key material (if no key material has been imported yet)
-
Import new key material (to add new material for rotation)
-
Reimport key material (available from the Actions menu in the key materials table)
-
Note
For Multi-Region keys, you must first import the new key material into the primary Region key. Then, import the same key material into each replica Region key.
For primary multi-Region keys, the Key materials table includes a Replica import state column that displays the import status across all replica regions (for example, "0 of 3 imported"). Choose the replica import state value to open a modal that shows the import status for each replica region. The modal provides Import key material links for replica regions where the new key material has not been imported.
-
-
If you downloaded the key material, import token, and encrypted the key material, choose Next.
Note
For Multi-Region keys, you must first import the new key material into the primary Region key. Then you can import the same key material into the replica Region keys.
-
In the Encrypted key material and import token section, do the following.
-
Under Wrapped key material, choose Choose file. Then upload the file that contains your wrapped (encrypted) key material.
-
Under Import token, choose Choose file. Upload the file that contains the import token that you downloaded.
-
-
In the Expiration option section, you determine whether the key material expires. To set an expiration date and time, choose Key material expires, and use the calendar to select a date and time. You can specify a date up to 365 days from the current date and time.
-
For symmetric encryption keys, you can optionally specify a description for the key material being imported.
-
Choose Import key material.
Import key material (Amazon KMS API)
To import key material, use the ImportKeyMaterial operation. The following example uses the Amazon CLI
To use this example:
For multi-Region keys, you can set or change the key material description only on the primary Region key. Amazon KMS automatically propagates the key material description to replica Region keys.
-
Replace
with a key ID of the KMS key that you specified when you downloaded the public key and import token. To identify the KMS key, use its key ID or key ARN. You cannot use an alias name or alias ARN for this operation.1234abcd-12ab-34cd-56ef-1234567890ab -
Replace
with the name of the file that contains the encrypted key material.EncryptedKeyMaterial.bin -
Replace
with the name of the file that contains the import token.ImportToken.bin -
If you want the imported key material to expire, set the value of the
expiration-modelparameter to its default value,KEY_MATERIAL_EXPIRES, or omit theexpiration-modelparameter. Then, replace the value of thevalid-toparameter with the date and time that you want the key material to expire. The date and time can be up to 365 days from the time of the request.$aws kms import-key-material --key-id1234abcd-12ab-34cd-56ef-1234567890ab\ --encrypted-key-material fileb://EncryptedKeyMaterial.bin\ --import-token fileb://ImportToken.bin\ --expiration-modelKEY_MATERIAL_EXPIRES\ --valid-to2023-06-17T12:00:00-08:00If you do not want the imported key material to expire, set the value of the
expiration-modelparameter toKEY_MATERIAL_DOES_NOT_EXPIREand omit thevalid-toparameter from the command.$aws kms import-key-material --key-id1234abcd-12ab-34cd-56ef-1234567890ab\ --encrypted-key-material fileb://EncryptedKeyMaterial.bin\ --import-token fileb://ImportToken.bin\ --expiration-modelKEY_MATERIAL_DOES_NOT_EXPIRE -
If you want to import new key material, not previously associated with the KMS key, set the
ImportTypeparameter toNEW_KEY_MATERIAL. This option can only be used with symmetric encryption keys. For these keys, you can also use the optionalKeyMaterialDescriptionparameter to set a description for the imported key material in the following command line example:$aws kms import-key-material --key-id1234abcd-12ab-34cd-56ef-1234567890ab\ --encrypted-key-material fileb://EncryptedKeyMaterial.bin\ --import-token fileb://ImportToken.bin\ --expiration-modelKEY_MATERIAL_EXPIRES\ --valid-to2023-06-17T12:00:00-08:00\ --import-type NEW_KEY_MATERIAL \ --key-material-description"Q2 2025 Rotation"
Tip
If the command does not succeed, you might see a KMSInvalidStateException
or a NotFoundException. You can retry the request.