AWS KMS establishes quotas for the number of API operations requested in each second. The request quotas differ with the API operation, the AWS Region, and other factors, such as the KMS key type. When you exceed an API request quota, AWS KMS throttles the request.
All AWS KMS request quotas are adjustable, except for the AWS CloudHSM key store request quota. To request a quota increase, see Requesting a quota increase in the Service Quotas User Guide. To request a quota decrease, to change a quota that is not listed in Service Quotas, or to change a quota in an AWS Region where Service Quotas for AWS KMS is not available, please visit AWS Support Center and create a case.
If you are exceeding the request quota for the GenerateDataKey operation, consider using the data key caching feature of the AWS Encryption SDK. Reusing data keys might reduce the frequency of your requests to AWS KMS.
In addition to request quotas, AWS KMS uses resource quotas to ensure capacity for all users. For details, see Resource quotas.
To view trends in your request rates, use the Service Quotas console. You can also create an Amazon CloudWatch alarm that alerts you when your request rate reaches a certain percentage of a quota value. For details, see Manage your AWS KMS API request rates using Service Quotas and Amazon CloudWatch in the AWS Security Blog.
Request quotas for each AWS KMS API operationThis table lists the Service Quotas quota code and the default value for each AWS KMS request quota. All AWS KMS request quotas are adjustable, except for the AWS CloudHSM key store request quota.
NoteYou might need to scroll horizontally or vertically to see all of the data in this table.
Quota name Default value (requests per second)Cryptographic operations (symmetric) request rate
Applies to:
Decrypt
Encrypt
GenerateDataKey
GenerateDataKeyWithoutPlaintext
GenerateMac
GenerateRandom
ReEncrypt
VerifyMac
These shared quotas vary with the AWS Region and the type of KMS key used in the request. Each quota is calculated separately.
10,000 (shared)
20,000 (shared) in the following Regions:
US East (Ohio), us-east-2
Asia Pacific (Singapore), ap-southeast-1
Asia Pacific (Sydney), ap-southeast-2
Asia Pacific (Tokyo), ap-northeast-1
Europe (Frankfurt), eu-central-1
Europe (London), eu-west-2
100,000 (shared) in the following Regions:
US East (N. Virginia), us-east-1
US West (Oregon), us-west-2
Europe (Ireland), eu-west-1
Cryptographic operations (RSA) request rate
Applies to:
Decrypt
Encrypt
ReEncrypt
Sign
Verify
1,000 (shared) for RSA KMS keys
Cryptographic operations (ML-DSA) request rate
Applies to:
Sign
Verify
Cryptographic operations (ECC and SM2) request rate
Applies to:
Decrypt
âonly supported for SM2 (China Regions only) KMS keys
DeriveSharedSecret
Encrypt
âonly supported for SM2 (China Regions only) KMS keys
ReEncrypt
âonly supported for SM2 (China Regions only) KMS keys
Sign
Verify
1,000 (shared) for elliptic curve (ECC) and SM2 (China Regions only) KMS keys
Custom key store request quotas
Applies to:
Decrypt
DeriveSharedSecret
Encrypt
GenerateDataKey
GenerateDataKeyWithoutPlaintext
GenerateRandom
ReEncrypt
1,800 (shared) for each AWS CloudHSM key store
1,800 (shared) for each external key store
CancelKeyDeletion request rate
ConnectCustomKeyStore request rate
CreateAlias request rate
CreateCustomKeyStore request rate
CreateGrant request rate
CreateKey request rate
DeleteAlias request rate
DeleteCustomKeyStore request rate
DeleteImportedKeyMaterial request rate
DescribeCustomKeyStores request rate
DescribeKey request rate
DisableKey request rate
DisableKeyRotation request rate
DisconnectCustomKeyStore request rate
EnableKey request rate
EnableKeyRotation request rate
GenerateDataKeyPair (ECC_NIST_P256) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
100
GenerateDataKeyPair (ECC_NIST_P384) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
100
GenerateDataKeyPair (ECC_NIST_P521) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
100
GenerateDataKeyPair (ECC_SECG_P256K1) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
100
GenerateDataKeyPair (RSA_2048) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
1
GenerateDataKeyPair (RSA_3072) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
0.5 (1 in each 2-second interval)
GenerateDataKeyPair (RSA_4096) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
0.1 (1 in each 10-second interval)
GenerateDataKeyPair (SM2 â China Regions only) request rate
Applies to:
GenerateDataKeyPair
GenerateDataKeyPairWithoutPlaintext
25
GetKeyPolicy request rate
GetKeyRotationStatus request rate
GetParametersForImport request rate
GetPublicKey request rate
ImportKeyMaterial request rate
ListAliases request rate
ListGrants request rate
ListKeyPolicies request rate
ListKeys request rate
ListKeyRotations request rate
ListResourceTags request rate
ListRetirableGrants request rate
PutKeyPolicy request rate
ReplicateKey request rate
A ReplicateKey
operation counts as one ReplicateKey
request in the primary key's Region and two CreateKey
requests in the replica's Region. One of the CreateKey
requests is a dry run to detect potential problems before creating the key.
RetireGrant request rate
RevokeGrant request rate
RotateKeyOnDemand request rate
ScheduleKeyDeletion request rate
TagResource request rate
UntagResource request rate
UpdateAlias request rate
UpdateCustomKeyStore request rate
UpdateKeyDescription request rate
UpdatePrimaryRegion request rate
An UpdatePrimaryRegion
operation counts as two UpdatePrimaryRegion
requests; one request in each of the two affected Regions.
When reviewing request quotas, keep in mind the following information.
Request quotas apply to both customer managed keys and AWS managed keys. The use of AWS owned keys does not count against request quotas for your AWS account, even when they are used to protect resources in your account.
Request quotas apply to requests sent to FIPS endpoints and non-FIPS endpoints. For a list of AWS KMS service endpoints, see AWS Key Management Service endpoints and quotas in the AWS General Reference.
Throttling is based on all requests on KMS keys of all types in the Region. This total includes requests from all principals in the AWS account, including requests from AWS services on your behalf.
Each request quota is calculated independently. For example, requests for the CreateKey operation have no effect on the request quota for the CreateAlias operation. If your CreateAlias
requests are throttled, your CreateKey
requests can still complete successfully.
Although cryptographic operations share a quota, the shared quota is calculated independently of quotas for other operations. For example, calls to the Encrypt and Decrypt operations share a request quota, but that quota is independent of the quota for management operations, such as EnableKey. For example, in the Europe (London) Region, you can perform 10,000 cryptographic operations on symmetric KMS keys plus 5 EnableKey
operations per second without being throttled.
AWS KMS cryptographic operations share request quotas. You can request any combination of the cryptographic operations that are supported by the KMS key, just so the total number of cryptographic operations doesn't exceed the request quota for that type of KMS key. The exceptions are GenerateDataKeyPair and GenerateDataKeyPairWithoutPlaintext, which share a separate quota.
The quotas for different types of KMS keys are calculated independently. Each quota applies to all requests for these operations in the AWS account and Region with the given key type in each one-second interval.
Cryptographic operations (symmetric) request rate is the shared request quota for cryptographic operations using symmetric KMS keys in an account and region. This quota applies to cryptographic operations with symmetric encryption keys and HMAC keys, which are also symmetric.
For example, you might be using symmetric KMS keys in an AWS Region with a shared quota of 10,000 requests per second. When you make 7,000 GenerateDataKey requests per second and 2,000 Decrypt requests per second, AWS KMS doesn't throttle your requests. However, when you make 9,500 GenerateDataKey
requests and 1,000 Encrypt and requests per second, AWS KMS throttles your requests because they exceed the shared quota.
Cryptographic operations on the symmetric encryption KMS keys in a custom key store count toward both the Cryptographic operations (symmetric) request rate for the account and the custom key store request quota for the custom key store.
Cryptographic operations (RSA) request rate is the shared request quota for cryptographic operations using RSA asymmetric KMS keys.
For example, with a request quota of 1,000 operations per second, you can make 400 Encrypt requests and 200 Decrypt requests with RSA KMS keys that can encrypt and decrypt, plus 250 Sign requests and 150 Verify requests with RSA KMS keys that can sign and verify.
Cryptographic operations (ECC) request rate is the shared request quota for cryptographic operations using elliptic curve (ECC) asymmetric KMS keys and SM asymmetric KMS keys.
For example, with a request quota of 1,000 operations per second, you can make 400 Sign requests and 200 Verify requests with ECC KMS keys that can sign and verify, plus 250 Sign requests and 150 Verify requests with SM2 KMS keys that can sign and verify.
Custom key store request quota is the shared request quota for cryptographic operations on KMS keys in a custom key store. This quota is calculated separately for each custom key store.
Cryptographic operations on the symmetric encryption KMS keys in a custom key store count toward both the Cryptographic operations (symmetric) request rate for the account and the custom key store request quota for the custom key store.
The quotas for different key types are also calculated independently. For example, in the Asia Pacific (Singapore) Region, if you use both symmetric and asymmetric KMS keys, you can make up to 10,000 calls per second with symmetric KMS keys (including HMAC keys) plus up to 500 additional calls per second with your RSA asymmetric KMS keys, plus up to 300 additional requests per second with your ECC-based KMS keys.
API requests made on your behalfYou can make API requests directly or by using an integrated AWS service that makes API requests to AWS KMS on your behalf. The quota applies to both kinds of requests.
For example, you might store data in Amazon S3 using server-side encryption with a KMS key (SSE-KMS). Each time you upload or download an S3 object that's encrypted with SSE-KMS, Amazon S3 makes a GenerateDataKey
(for uploads) or Decrypt
(for downloads) request to AWS KMS on your behalf. These requests count toward your quota, so AWS KMS throttles the requests if you exceed a combined total of 5,500 (or 10,000 or 50,000 depending upon your AWS Region) uploads or downloads per second of S3 objects encrypted with SSE-KMS.
When an application in one AWS account uses a KMS key owned by a different account, it's known as a cross-account request. For cross-account requests, AWS KMS throttles the account that makes the requests, not the account that owns the KMS key. For example, if an application in account A uses a KMS key in account B, the KMS key use applies only to the quotas in account A.
Custom key store request quotasAWS KMS maintains request quotas for cryptographic operations on the KMS keys in a custom key store. These request quotas are calculated separately for each custom key store.
NoteAWS KMS custom key store request quotas do not appear in the Service Quotas console. You cannot view or manage these quotas by using Service Quotas API operations. To request a change to your external key store request quota, visit the AWS Support Center and create a case.
If the AWS CloudHSM cluster associated with an AWS CloudHSM key store is processing numerous commands, including those unrelated to the custom key store, you might get an AWS KMS ThrottlingException
at a lower-than-expected rate. If this occurs, lower your request rate to AWS KMS, reduce the unrelated load, or use a dedicated AWS CloudHSM cluster for your AWS CloudHSM key store.
AWS KMS reports throttling of external key store requests in the ExternalKeyStoreThrottle CloudWatch metric. You can use this metric to view throttling patterns, create alarms, and adjust your external key store request quota.
A request for a cryptographic operation on a KMS key in a custom key store counts toward two quotas:
Cryptographic operations (symmetric) request rate quota (per account)
Requests for cryptographic operations on KMS keys in a custom key store count toward the Cryptographic operations (symmetric) request rate
quota for each AWS account and Region. For example, in US East (N. Virginia) (us-east-1), each AWS account can have up to 100,000 requests per second on symmetric encryption KMS keys, including requests that use a KMS key in a custom key store.
Custom key store request quota (per custom key store)
Requests for cryptographic operations on KMS keys in a custom key store also count toward a Custom key store request quota
of 1,800 operations per second. These quotas are calculated separately for each custom key store. They might include requests from multiple AWS accounts that use KMS keys in the custom key store.
For example, an Encrypt operation on a KMS key in a custom key store (either type) in the US East (N. Virginia) (us-east-1) Region counts toward the Cryptographic operations (symmetric) request rate
account-level quota (100,000 requests per second) for its account and Region, and toward a Custom key store request quota
(1,800 requests per second) for its custom key store. However, a request for a management operation, such as PutKeyPolicy, on a KMS key in a custom key store applies only to its account-level quota (15 requests per second).
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4