Download Publication
Who it's for:
- Cloud service customers
- Cloud service providers
- HSM manufacturers
- Key management solution providers
- Application developers
- Auditors
HSM-as-a-Service Use Cases, Considerations, and Best Practices
Release Date: 04/03/2024
Working Group: Cloud Key Management
A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive and intrusion-resistant device comprising a security cryptographic accelerator, hardware-based random number generator, processor, RAM, storage, and external interface. HSMs are often considered the root of trust, as the cryptographic keys created and protected by an HSM are used to underpin the security of an organization’s infrastructure.
This document describes the Hardware Security Module as a Service (HSMaaS) cloud delivery model for key management and cryptographic operations. Additionally, it explores a sample of use cases with unique drivers justifying this model, discusses logical and physical security considerations, and provides recommendations on how to demonstrate compliance and select a vendor.
Cloud service customers that require increased control over key management operations, providers that supply the technology or services to deliver HSMaaS, as well as auditors and Conformity Assessment Bodies, can all benefit from the knowledge in this comprehensive guide.
Key Takeaways:
- The definition and architecture of an HSM
- The current and future state of the HSMaaS market
- Industry, compliance, and risk use cases for the HSMaaS model
- The importance of clearly defined responsibilities in the HSMaaS model
- Security considerations for HSMs
- Key management considerations unique to HSMaaS
- Important considerations when setting up governance for HSMs
- HSM vendor selection best practices
Download this Resource
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training

CSA's Cloud Infrastructure Security training provides a high-level introduction to the most critical cloud security topics through virtual self-paced courses. Each Cloud Infrastructure Security training focuses on a specific area of cloud computing, and is design to be succinct, taking one-hour to complete.
Learn more
Learn more

.jpeg)

.jpeg)
.jpeg)