Skip to content

Take Control Of IAM Identity Center With CMKs

Jacob Heinz
Jacob Heinz |

AWS IAM Identity Center (formerly AWS SSO) now supports encrypting user, group, and instance metadata at rest with your own customer-managed AWS KMS keys (CMKs).

Key takeaways

  • You control key lifecycle, policies, rotation, and revocation.
  • Encryption context ties decrypt operations to your specific Identity Center instance for stronger misuse protection.
  • Switching to or between CMKs takes seconds; if permissions are misconfigured, the service auto-falls back to the previous key to protect availability and surfaces an error for admins.
  • All KMS cryptographic calls are logged in AWS CloudTrail for audit.
  • Identity Center remains free; standard AWS KMS charges apply.

Practical guidance

  • Create a symmetric CMK in the same Region as your Identity Center organization instance.
  • Use a tight key policy for admin access; delegate usage via grants to the Identity Center service roles.
  • Enable key rotation; tag keys with owner/purpose/environment.
  • After enabling in Identity Center settings (Manage encryption), smoke test sign-in, attribute CRUD, and account/app launches; verify KMS Encrypt/Decrypt in CloudTrail.
  • Set alerts for unusual CMK usage; keep a break-glass role and deny risky actions like ScheduleKeyDeletion to most operators.

Who benefits most: regulated orgs (GDPR, HIPAA, PCI DSS, SOC 2), teams standardizing on CMKs, and enterprises requiring separation of duties between identity operations and key custodians.

In short: you keep the same Identity Center experience, gain full key governance and auditability, and can meet strict compliance requirements without disrupting SSO.

Share this post