Bring Your Own Key (BYOK)
This feature is available only for hosted cloud environments.
A cryptographic key is used to encrypt and decrypt a BlackBerry Workspaces organization's files. As of version 7.0, the Bring Your Own Key (BYOK) security policy for public cloud instances of BlackBerry Workspaces allows third party key management solutions to be used instead of BlackBerry provided keys. This allows organizations to:
- Encrypt and decrypt documents from storage using their own key
- Revoke the key, if needed.Revoking a key is a destructive action. You must carefully consider the action before performing it.
A cloud organization who wishes to use this feature provides its own Amazon Web Services (AWS) Key Management Service (KMS) Key to encrypt organizational files. Decryption requires Workspaces to be integrated as an External Account with access to the AWS KMS Key. Access to both the AWS KMS interface and the Workspaces Admin Console is necessary.
BYOK requires an additional license to be purchased; contact your account manager for more details.
BYOK requires the BYOK tier in the Workspaces configuration. Contact your account manager for more information.
Take the following steps to Bring-Your-Own-Key (BYOK) in a BlackBerry Workspaces cloud environment:
- Create or retrieve the Master Key from Amazon Web Services (AWS):
- Sign into your AWS IAM Account with your Account ID.
- At the IAM Home Screen, select the appropriate Region.
- Select theEncryption Keyslink from the left-hand sidebar.
- Click theCreate Keysbutton.
- Type theNameof the Key and click theNextbutton.
- If desired, add aTagfor the Key and click theNextbutton.
- Define aKey Administrator.
- Confirm the Key Administrator has the ability to Generate Data Keys:
- Sign into the AWS IAM Account and access thePoliciessection from the left-hand sidebar.
- Review the JSON of the Policy you intend to use with the Key Administrator.
- Confirm that the Policy's JSON includes the linekms:generateDataKey.
- Access theUserssection from the left-hand sidebar.
- Select the relevant Key Administrator.
- Add the relevant Policy that includes the ability tokms:generateDataKey.
- Grant access to the Master Key for the Workspaces organization:
- Sign into the AWS IAM Account and access theEncryption Keyssection from the left-hand sidebar.
- Find theExternal Accountsheader.
- Click theAdd External Accountbutton.
- Add the Workspaces Amazon Account ID as an External Account.
- Create an AWS KMS Encryption Key to be used for encrypting and decrypting Workspaces organizational files:
- Download the Amazon Command Line Interface tool.
- Add the AWS EXE to your Operating System's PATH environmental variables. For example, addC:\Program Files\Amazon\AWSCLIto the PATH variable.
- Run the EXE.
- Inputaws configure.
- When prompted, input the AWS Access Key ID. This should be the Master Key Administrator's User Access Key.
- When prompted, input the AWS Secret Access Key.
- When prompted, input the default region name. For example, us-east-1.
- When prompted, input the default output format. For example, json.
- Inputaws kms generate-data-key --key-id <key-ARN> --key-spec AES_256. For example,aws kms generate-data-key --key-id arn:aws:kms:us-east-1:############:key/########-####-####-####-############ --key-spec AES_256.Note: This value can be located within thePolicy JSONlisted in Step #2 above as the contents of theResourcefield.
- The Response JSON will include the following information:{ "Plaintext" : "aStringOfCharactersWillBeReturned" "KeyId": "TheSameKeyIdWilBeReturnedThatWasInput" "CiphertextBlob" : "aStringOfCharactersToBeEnteredInTheBlackBerryWorkspacesAdminConsoleWithoutTheQuotesAtTheBeginningAndEnd" }
- Save these encrypted values as they will be used in the BlackBerry Workspaces Admin Console.
- Add the AWS KMS Encryption Key to the BlackBerry Workspaces Admin Console:
- In the BlackBerry Workspaces admin console, clickSecurity Policies>Bring Your Own Key.
- Select an appropriate Amazon Web Services (AWS) region from the dropdown.
- In theCustomer Master Encryption Keyfield, input theCiphertextBlobthat was returned in thegenerate-data-key Response JSON.
- ClickActivate Key.
To revoke the key, click
Revoke Key
. Access to all documents uploaded before and after the key was generated will be revoked.Additional considerations include:
- Files which has been synced with full access permissions will still be available after the revoke
- DocuSign integration fails for files which were uploaded before revoking the BYOK
- Annotation symbols still appear after revoking access for a document with annotations
- Revoking a key in organizations which were created before BlackBerry Workspaces version 5.3 will still allow access to documents uploaded before BYOK configuration
- Text and office 97-2003 and non converted documents will show non-readable characters when opened after revoking the key. PDF documents will not open.