Using HSM-protected encryption keys

In connection with (or as an alternative to) the Venafi Platform software key, Trust Protection Platform allows you to use AES encryption keys stored on supported and compatible hardware security modules (HSMs).

An HSM is a dedicated, physical device designed to securely manage, process, store, and even generate cryptographic keys. HSMs are used to enhance the security of sensitive data and cryptographic operations in many industries.

Key characteristics and functions of an HSM include:

  • Secure key management

  • Safe cryptographic operations

  • Tamper resistance

  • Compliance and certification with industry standards

  • Access controls

  • Backup and recovery

HSMs are specialized devices that provide a secure environment for cryptographic operations and key management, significantly enhancing the security posture of any organization that handles sensitive data and transactions.

An HSM must be properly connected to each server in the cluster. Connection information between the server and the HSM is stored in encrypted format in the server's Windows Registry as well as in the database's Secret Store. When you make changes (In VCC) to the HSM configuration settings, the changes are communicated to all other servers in the cluster, which will update their own Windows Registry settings with the updated information. Thus, changes to HSM configuration settings don't need to be repeated on all servers in the cluster.

IMPORTANT  If you elect to use a hardware security module (HSM) to protect your assets in Trust Protection Platform, you must ensure that you use your HSM vendor's documented method to back up the keys. In addition, if you use Venafi Platform software encryption, you should ensure the software key is backed up. For information on backing up the software key, see Backing up the software encryption key.

What's next?