Set up the AWS Key Encryption Key (KEK)
When a customer's Verint WFO cloud system supports AWS Key Management Server (KMS), customers can create the Key Encryption Key (KEK) in their AWS Console. AWS refers to this KEK as the Customer-Managed Key (CMK).
How AWS secures keys
The AWS KMS integration uses the AWS KMS API to store the Key Encryption Key (KEK). The KEK is used to encrypt and decrypt the Data Encryption Key (DEK). The DEK is used to encrypt the customer's interaction In Speech Analytics, an interaction represents a single part of the contact between one employee and the same customer. In Text Analytics, an interaction is the communication session between one or more employees and the same customer with a unifying contextual element. media and transcription Process in Speech Analytics of converting audio files of the recorded agent-customer conversation to text. data, such as recorded voice calls.
The customer creates and provides the KEK. Verint provides the DEK and the Amazon DynamoDB that stores it. Every day, the Verint recording solution uses the KEK to generate a new DEK. In this way, the KEK is secured because AWS manages the encryption and decryption of the KEK and the DEK through the AWS KMS API.
Procedure
-
In the customer's AWS account, create an IAM user (optional) and an IAM role (best practice) that include the AWSKeyManagementServicePowerUser policy.
-
Take note of the Client access key ID and Client secret access key.
-
If an IAM role is in use, get the AWS role ARN and External ID of the IAM role.
-
Create an AWS KMS key (AWS KMS Developer Guide).
-
When using an asymmetric key, set Key Usage to Encrypt and Decrypt, and set Key Spec to RSA_4096.
-
When using a symmetric key, there are no specific settings to configure.
-
Take note of the AWS region and the Key Alias.
-
Configure Encryption Key Management