A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive and intrusion-resistant device comprising a security cryptographic accelerator, hardware-based random number generator, processor, RAM, storage, and external interface. HSMs are often considered the root of trust, as the cryptographic keys created and protected by an HSM are used to underpin the security of an organization’s infrastructure.
This document describes the Hardware Security Module as a Service (HSMaaS) cloud delivery model for key management and cryptographic operations. Additionally, it explores a sample of use cases with unique drivers justifying this model, discusses logical and physical security considerations, and provides recommendations on how to demonstrate compliance and select a vendor.
Cloud service customers that require increased control over key management operations, providers that supply the technology or services to deliver HSMaaS, as well as auditors and Conformity Assessment Bodies, can all benefit from the knowledge in this comprehensive guide.
Key Takeaways:
- The definition and architecture of an HSM
- The current and future state of the HSMaaS market
- Industry, compliance, and risk use cases for the HSMaaS model
- The importance of clearly defined responsibilities in the HSMaaS model
- Security considerations for HSMs
- Key management considerations unique to HSMaaS
- Important considerations when setting up governance for HSMs
- HSM vendor selection best practices
Topics: Cloud Key ManagementEnhancing cloud security strategy
Best For:
- Cloud service customers
- Cloud service providers
- HSM manufacturers
- Key management solution providers
- Application developers
- Auditors




