What are Hardware Security Modules? Definition & FAQs | Avi Networks (2024)

<< Back to Technical Glossary

Hardware Security Module Definition

A hardware security module (HSM) is a dedicated cryptographic processor that manages and safeguards digital keys. Designed specifically to protect the crypto key lifecycle, hardware security modules perform encryption and decryption functions for strong authentication, digital signatures, and other cryptographic functions.

HSMs serve as trust anchors to create hardened, tamper-resistant environments for storing cryptographic keys. Traditionally, a hardware security module includes one or more secure cryptoprocessor chips and usually exists as an external device or plug-in card that attaches directly to a network server or computer.

What are Hardware Security Modules? Definition & FAQs | Avi Networks (1)

FAQs

What is a Hardware Security Module?

A general purpose hardware security module is a standards-compliant cryptographic device that uses physical security measures, logical security controls, and strong encryption to protect sensitive data in transit, in use, and at rest. An HSM might also be called a secure application module (SAM), a personal computer security module (PCSM), or a hardware cryptographic module.

The hardware security module creates a trusted environment for performing a variety of cryptographic operations, including key exchange, key management, and encryption. In this context, “trusted” means free of malware and viruses, and protected from exploits and unauthorized access.

An HSM can be trusted because:

  • It is built atop certified, well-tested, specialized hardware.
  • It runs a security-focused OS.
  • Its entire design actively protects and hides cryptographic information.
  • It has limited access to the network through a moderated interface that is strictly controlled by internal rules.

Without a hardware security module, ordinary operations and cryptographic operations take place in the same locations, so attackers can access ordinary business logic data alongside sensitive information such as keys and certificates. Hackers can install arbitrary certificates, expand unauthorized access, alter code, and otherwise dangerously impact cryptographic operations.

How Do Hardware Security Modules Work?

Encryption, the process of rendering sensitive data indecipherable except to those with authorized access, forms the basis for an HSM’s core functionality. Secure decryption and message authentication are also part of HSM functionality.

Randomly generated values are essential to the encryption process, because they are used to create encryption keys. Decrypting that sensitive information is always just one step away with the keys in hand, so storage of encryption keys in a secure environment is essential.

Hardware security modules generate and store encryption keys used among various devices. They have special hardware to create entropy and generate high quality random keys. Larger organizations may operate multiple HSMs concurrently instead of just one. Whether one or many HSMs are deployed, a streamlined, centralized key management system based on both external regulations and strong internal security policies improves security and compliance.

HSMs are typically certified to internationally recognized standards such as FIPS 140 or Common Criteria. This is related to the critical function of HSMs in securing infrastructure and applications, and the related need to ensure users that product and cryptographic algorithm design and implementation are sound. The highest achievable certification level of FIPS 140 security is Security Level 4. Users often validate the security of an HSM against the Payment Card Industry Security Standards Council’s defined requirements for HSMs in financial payments applications.

Hardware Security Module Architecture

HSMs may have tamper-proof or tamper-resistant features. For example, hardware security modules may show visible signs of logging and alerting, or may become inoperable if they are tampered with. Some HSMs may delete keys upon detection of tampering. Hardware security modules are typically protected by tamper resistant, tamper evident, or tamper responsive packaging, and contain one or multiple cryptoprocessor chips or a module containing a combination of chips to prevent bus probing and tampering.

HSMs can generally be clustered for high availability since they are often part of mission-critical infrastructure such as an online banking application or a public key infrastructure. Some hardware security modules enable business continuity and conform to the high-availability requirements of data center environments. For example, they may feature field replaceable components or dual power supplies to ensure availability in spite of disaster.

Some HSMs can internally execute specially developed modules in native C language, Java, .NET, or other programming languages. Such a capability can assist an organization that needs to execute business logic or special algorithms in a trusted environment. Next-generation hardware security modules can often tackle running and loading COTS software and operating systems and other complex tasks without demanding complete reprogramming and customization.

Hardware Security Module Applications

Any application that employs digital keys may use a hardware security module. Generally, to justify the use of an HSM, compromise of the keys would need to cause serious, negative impact. In other words, digital keys must be of high value to be generated and maintained in a hardware security module USB or other device.

The key functions of an HSM are as follows:

  • For a certificate authority, the HSM is an onboard cryptographic key generation and secure key storage facility, particularly for primary keys, or the most sensitive, top level keys.
  • Assists in the authentication process by verifying digital signatures.
  • Verifies integrity of sensitive data stored in relatively less secure locations such as databases and encrypts the sensitive data securely for storage.
  • Generates secure keys for smart card production.
  • Manages keys for storage devices such as tape or disk and transparent data encryption keys for databases.
  • Provides both physical and logical protection of sensitive information, including cryptographic keys, from non-authorized use, disclosure, and potential attackers.
  • Supports both asymmetric or public-key cryptography and symmetric cryptography.
  • Some HSM systems act as hardware cryptographic accelerators for SSL connections and many offer asymmetric key operations significant CPU offload. Most HSMs also now support elliptic curve cryptography (ECC), which provides stronger encryption despite shorter key lengths.
  • For applications that are performance-critical and must use HTTPS (SSL/TLS), an SSL acceleration HSM can relocate RSA operations from the host CPU to the HSM device. RSA operations usually demand several large integer multiplications, and typical hardware security modules can perform about 1 to 10,000 1024-bit RSA operations/second. Certain specialized hardware based security modules can achieve 20,000 operations per second.
  • In PKI environments, registration authorities (RAs) and certification authorities (CAs) may use HSMs to generate, manage, and store asymmetric key pairs.
  • Bank hardware security modules or card payment system hardware security modules are specialized HSMs applied in the payment card industry. As such, these HSMs support both typical hardware security module functions and specialized functions that transaction processing and industry standards for compliance demand. Typical applications are personalization of payment cards and authorization of transactions. The major standard-setting organizations for banking HSMs are ANS X9, the Payment Card Industry Security Standards Council (PCISSC), and ISO.
  • Some registries store core material for signing large zone files in HSMs. For example, OpenDNSSEC is an open source hardware security module tool for managing signing of DNS zone files.
  • HSMs can be used as cryptocurrency wallets.

HSMs vs Trusted Execution Environments (TEEs) and Trusted Platform Modules (TPMs)

A trusted execution environment (TEE) is a secure area created as part of a main computer processor. It is designed to ensure that data and code inside the TEE is protected in terms of integrity and confidentiality.

A trusted platform module (TPM) is a special chip designed and soldered into the motherboard so that accessing its secret keys is both difficult and immediately obvious. This physical step is intended to provide a hardware source of trust in the computing system. TPMs do not generally add computational capacity although they can offer some basic capabilities such as random keys generation, or the encryption of small amounts of data.

A hardware security module, in contrast, keeps the encryption keys external to the operating system. Although there is some overlap between TEEs, TPMs, and HSMs, they are not the same and do not provide identical benefits. Like TPMs, HSMs also make physical tampering obvious, but they tend to provide higher levels of protection than both TPMs and TEEs.

Some argue that HSMs need not depend on physical tamper protection and proprietary hardware architectures any longer. Instead, they can exploit the security properties of TEEs to create a “soft HSM” or virtual hardware security module. For example, Google’s Cloud HSM is billed as a cloud hardware security module, a totally virtual service version of the HSM.

These solutions certainly simplify scaling using cloud-native technologies. However, an even greater level of security can be achieved by implementing an HSM using those same cloud-native technologies to improve performance and reduce operational challenges related to hardware.

To summarize:

  • TEEs offer a general, built-in processing environment. They are part of a chipset.
  • TPMs provide limited processing capacities, measurement of the boot sequence and other components, and a physical source for trust. They are an inexpensive built-in component.
  • HSMs are the highest security environment for sensitive data processing, management or storage of secret keys, and cryptographic operations. They are typically more costly, external devices, although cloud technologies can help render them less expensive and more scalable.

Benefits and Features of Hardware Security Modules

The main benefits of hardware security modules are: physical access protection, secure management of key material, secure generation of keys, and secure execution environment.

There is no way to completely protect conventional IT systems from external attack. In contrast, HSMs boast a range of protective mechanisms designed to deter external attack and any physical tampering. These typically include: voltage and temperature sensors, resin-embedded chips, and drill protection foil.

For example, if an attacker attempts to drill open an HSM device, either by breaking open the casing or using acid or icing up the casing to erode the layers, sensors immediately register the attack, trigger an alarm, and initiate any specified countermeasures set forth in the configuration, such as the deletion of keys.

Keys are only useful when they are random and well-protected, or they are easily guessed by attackers. In conventional IT systems, limited means exist for generating secure keys, because they are relying on traditional commands which process if-then situations. Unfortunately, knowing the “if” or input data for any given command can allow a skilled attacker to predict the “then” or output data.

HSMs defeat this issue by generating truly random keys. They do this by registering data from random physical processes in the vicinity such as atmospheric noise or atomic decay processes to produce unpredictable values to use as the basis for random keys.

Importantly, a hardware security module generates, stores, and uses these keys in executing signatures, encryptions, and other cryptographic operations—and all of these security-critical processes take place inside the secure environment of the HSM.

Since the keys for cryptographic operations never escape the HSM, the environment provides maximum protection against logical attack: it is virtually impossible to steal them. Some hardware security modules also protect users from Trojans and insider attacks by providing a secure execution environment for user applications. In these systems, the entire application is programmed and executed inside the secure space of the HSM.

Best Practices of Using HSMs

The following are the most important benefits and features of hardware security modules to consider:

FIPS 140-1 or 140-2 compliance and validation. The Federal Information Processing Standard (FIPS) defines four levels for validating HSMs. Validation means an HSM has passed a reasonable baseline of security tests performed at FIPS accredited testing facilities by qualified professionals. This goes far beyond mere compliance with FIPS 140.

Proprietary versus open algorithms. Avoid secret proprietary algorithms unless they are in addition to options that are open and widely accepted yet secure. (If your HSM uses both, ensure it is configured properly so it will not use the proprietary algorithms.) Look for DSA or RSA based cryptographic algorithms for digital signatures. For hashing, MD5 or SHA-1 are good alternatives. 3-DES is a good choice for encryption.

Strong random number generation. Any HSM must be capable of strong random number generation (RNG) or pseudo-random number generation in order to support key generation and other cryptographic functions.

Scalability. Hardware security module architecture should support load balancing and clustering so it can scale with growing network architecture.

A secure time source. Secure non-repudiation and auditing demand a secure time and date source for logged messages. An easily hacked server-based time source is among the few common hardware security module vulnerabilities. Only an authenticated administrator should be permitted to change the time on an HSM which should also securely log the event.

Ease of use. A standardized developer interface and secure, simple user interface both facilitate use of the HSM and help avoid expensive errors.

Well-documented device installation. Clearly document all installation and maintenance events, including battery replacements, known hardware conflicts, machine compatibility issues, and physical switches on the device.

Key backup. Secure key backup is critical for any HSM used for verifying or encrypting data in a database, or within a certificate authority. Optimally, backup keys to multiple smart cards, and store them separately.

Key protection. A hardware security module should protect keys by encrypting any that are exported beyond its physical boundary.

Tamper-resistance. The HSM should delete all sensitive data or “zeroize” itself should it detect any anomalous electrical activity, physical penetration, unusual temperature, or other signs of tampering. This stops a successful attacker from retrieving the secret keys once they have gained physical access.

Of course, there are several disadvantages of hardware security modules—mostly surrounding cost, depending on the levels of security and functionality that the facts demand. Some HSMs are also difficult to implement and upgrade. However, harnessing cloud-native technologies and their inherent scalability can help with each of these issues.

Does The VMware NSX Advanced Load Balancer Offer Hardware Security Module Solutions?

The right hardware security module ensures your business addresses compliance requirements with solutions for blockchain, bulk key generation, certificate signing, code or document signing, data encryption, digital signatures, DNSSEC, GDPR, hardware key storage, paper-to-digital initiatives, IoT, PCI DSS, transactional acceleration, and more.

The VMware NSX Advanced Load Balancer supports integration of networked hardware security module (HSM) products, including Thales nShield and SafeNet Network HSM. Learn more about integrating HSMs with VMware NSX Advanced Load Balancer here.

For more on the actual implementation of load balancing, security applications and web application firewalls check out ourApplication Delivery How-To Videos.

What are Hardware Security Modules? Definition & FAQs | Avi Networks (2024)

FAQs

What are Hardware Security Modules? Definition & FAQs | Avi Networks? ›

Hardware security modules (HSMs) are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates.

What is hardware security in network security? ›

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that's installed on the hardware of a computer system. Hardware security can pertain to a device used to scan a system or monitor network traffic.

What is a HSM in networking? ›

A hardware security module (HSM) is a physical computing device that safeguards and manages secrets (most importantly digital keys), performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions.

What are the two types of HSM? ›

While the General Purpose HSM is used for digital signatures, to encrypt or decrypt information, to verify and validate digital identity or to generate and custody KPI keys, the Financial HSM can be used to generate, manage and validate the PIN, to recharge the card, to validate the card, user and cryptogram during ...

What is an example of a hardware security module? ›

For example, a company might use an HSM to secure trade secrets or intellectual property by ensuring only authorized individuals can access the HSM to complete a cryptography key transfer.

What are hardware security models? ›

Hardware security modules (HSMs) are hardened, tamper-resistant hardware devices that secure cryptographic processes by generating, protecting, and managing keys used for encrypting and decrypting data and creating digital signatures and certificates.

What is the difference between Hardware Security Module and TPM? ›

HSMs are different from trusted platform modules (TPMs) even though both are physical devices and involve data encryption. An HSM is a removable unit that runs on its own, while a TPM is a chip on your motherboard that can encrypt an entire laptop or desktop disk.

Why do I need an HSM? ›

HSMs can help enable you to meet widely recognized government and industry mandates for financial, healthcare, and other sensitive data, such as FIPS, Common Criteria, GDPR, HIPAA, and PCI-DSS.

How is an HSM used? ›

Hardware Security Modules (HSMs) are hardened, tamper-resistant hardware devices that strengthen encryption practices by generating keys, encrypting and decrypting data, and creating and verifying digital signatures.

What is general purpose hardware security module? ›

General purpose hardware security modules use common encryption algorithms and are mainly used with crypto wallets, public key infrastructure (PKI), and in the security of basic sensitive data. Some of the common algorithms general purpose HSMs use include CAPI, PKCS#11, CNG, and others.

What are the risks of hardware security module? ›

Vulnerabilities in Hardware Security Modules (HSMs) allow attackers to retrieve sensitive data. Several vulnerabilities are detected in the HSM of a major vendor, allowing an attacker to take full control of the vendor's HSM.

Why do we need hardware security? ›

What to Know about Hardware Security. Cyberattacks are shifting toward applications and devices below the operating system that software can't protect. Hardware-based security helps secure data, maintain device integrity, and ensure systems start and operate as intended.

What are the disadvantages of HSM? ›

Disadvantages of HSM —Higher acceleration and deceleration rates, and spindle start and stop result in faster wear of guideways, ball screws, and spindle bearings, leading to higher maintenance costs. Also, HSM requires specific process knowledge, programming equipment, and interfaces for fast data transfer.

What is the difference between software and HSM? ›

Hardware-based solutions like HSMs perform better than software-only solutions. They contain dedicated cryptographic processors that can execute complex encryption operations without draining your CPU's resources.

What is the description of HSM? ›

Definitions: A physical computing device that safeguards and manages cryptographic keys and provides cryptographic processing. An HSM is or contains a cryptographic module.

What are the three types of security in network security? ›

Technical security measures are focused on protecting data through encryption and other technologies. Physical security of networks involves securing network hardware and infrastructure. Administrative security includes policies for data access and the increasingly popular Zero-Trust approach.

Why is hardware security important? ›

It helps protect the computer system against potential risks, hacker attacks, unauthorized access, intrusion, etc. Preventing security breaches can be expensive and annoying. Using tools for security testing and putting protocols in place that help mitigate risks while offering protection is the key.

What is the difference between physical security and hardware security? ›

Simply put, hardware security involves protection through physical devices or operations rather than security programs such as antivirus. In terms of 'physical' security, hardware security essentially entails protecting on-premise systems from natural or human tampering or destruction.

What is standard hardware security? ›

Your device meets the requirements for standard hardware security. This means your device supports memory integrity and core isolation and also has: TPM 2.0 (also referred to as your security processor) Secure boot enabled.

Top Articles
Reinstall and re-enable apps - Android
The Six Elements of Balanced Wealth - Trillium Financial
Omega Pizza-Roast Beef -Seafood Middleton Menu
Mickey Moniak Walk Up Song
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Wmu Course Offerings
Konkurrenz für Kioske: 7-Eleven will Minisupermärkte in Deutschland etablieren
CSC error CS0006: Metadata file 'SonarAnalyzer.dll' could not be found
Chastity Brainwash
Robert Malone é o inventor da vacina mRNA e está certo sobre vacinação de crianças #boato
Los Angeles Craigs List
Vcuapi
N2O4 Lewis Structure & Characteristics (13 Complete Facts)
Water Trends Inferno Pool Cleaner
[Cheryll Glotfelty, Harold Fromm] The Ecocriticism(z-lib.org)
Quick Answer: When Is The Zellwood Corn Festival - BikeHike
Military life insurance and survivor benefits | USAGov
Bellin Patient Portal
Kitchen Exhaust Cleaning Companies Clearwater
Wolfwalkers 123Movies
Speechwire Login
Chelsea Hardie Leaked
What we lost when Craigslist shut down its personals section
Duke Energy Anderson Operations Center
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Mta Bus Forums
Captain Billy's Whiz Bang, Vol 1, No. 11, August, 1920&#10;America's Magazine of Wit, Humor and Filosophy
Google Flights Orlando
This 85-year-old mom co-signed her daughter's student loan years ago. Now she fears the lender may take her house
Tsbarbiespanishxxl
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
Weather In Allentown-Bethlehem-Easton Metropolitan Area 10 Days
Tfn Powerschool
Exam With A Social Studies Section Crossword
UT Announces Physician Assistant Medicine Program
Po Box 101584 Nashville Tn
What is a lifetime maximum benefit? | healthinsurance.org
Frequently Asked Questions
Minecraft: Piglin Trade List (What Can You Get & How)
Automatic Vehicle Accident Detection and Messageing System – IJERT
Barback Salary in 2024: Comprehensive Guide | OysterLink
Cryptoquote Solver For Today
Wrentham Outlets Hours Sunday
Sleep Outfitters Springhurst
Congressional hopeful Aisha Mills sees district as an economical model
sin city jili
Chitterlings (Chitlins)
BYU Football: Instant Observations From Blowout Win At Wyoming
How Did Natalie Earnheart Lose Weight
When Is The First Cold Front In Florida 2022
Latest Posts
Article information

Author: Francesca Jacobs Ret

Last Updated:

Views: 5768

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Francesca Jacobs Ret

Birthday: 1996-12-09

Address: Apt. 141 1406 Mitch Summit, New Teganshire, UT 82655-0699

Phone: +2296092334654

Job: Technology Architect

Hobby: Snowboarding, Scouting, Foreign language learning, Dowsing, Baton twirling, Sculpting, Cabaret

Introduction: My name is Francesca Jacobs Ret, I am a innocent, super, beautiful, charming, lucky, gentle, clever person who loves writing and wants to share my knowledge and understanding with you.