Enclaive Multi Cloud Platform
HomeDocumentationTutorialsTry Cloud
  • Enclaive Multi Cloud Platform
  • Documentation
    • What is EMCP?
    • Why use EMCP?
    • Features
      • Virtual HSM
      • Vault
      • Nitride
      • Buckypaper
      • Dyneemes
      • Morphism
    • Supported Cloud Platforms
  • Tutorials
    • Buckypaper
      • Create a Buckypaper VM
      • Connect with SSH
      • Manage DNS
        • Cloudflare
      • Tag Buckypaper
      • Secure your VM with Firewall
      • Turn on/off Buckypapers
      • Destroy Buckypapers
    • Dyneemes
      • Create clusters
      • Connect to a cluster
      • Setup advanced monitoring
      • Upgrade without data loss
      • Add nodes and node pools
      • Drain and restart nodes
    • Data-in-use encrypting Database
      • Create a database cluster
      • Configure CNAME DNS record
      • Delete Applications
    • Applications
      • Create Nextcloud Hub
      • Configure CNAME DNS record
      • Delete Applications
      • After the installation
    • Billing
      • Add/Update payment method
      • Add/Change address
      • Add/Change VAT
    • Settings
      • Manage Team
        • Create a team
        • Delete a team
        • Invite team members
        • Remove team members
      • Bring your own Subscription
        • Azure
        • AWS
        • Google Cloud Platform
    • Account
      • Registration
      • Login
      • Delete account
  • Developers
    • API
      • Console
        • Auth
          • JWKS
        • Account
          • Need
        • Projects
          • Activity
        • Manage
          • Application
            • DNS
          • Database
          • Kubernetes
          • Virtual Machine
            • Security rule
          • Configurations
            • Location
            • Image
            • Price
            • Size
            • Provider
            • Cloud Provider
          • Attestation
        • vHSM
          • BYOS
          • User Storage
        • Settings
          • Team
          • Invite
        • Billing
          • Settings
          • Invoice
          • Cost
          • Promo - TODO
        • Support
          • Hubspot Files
          • Ticket
      • Admin
        • Auth
        • Accounts
          • Team
            • User
            • Application
            • Virtual machine
            • Database
            • Cluster
            • Resource
        • Quotas
          • Default quota
          • Provider quota
          • Team quota
        • Invoices
  • Resources
    • Blog
    • GitHub
    • Youtube
    • CCx101
Powered by GitBook
On this page

Was this helpful?

  1. Documentation
  2. Features

Virtual HSM

Last updated 1 year ago

Was this helpful?

Hardware Security Module is a dedicated crypto processor specifically designed for the protection of the crypto key lifecycle. It securely manages, processes, and stores cryptographic keys inside a hardened, tamper-resistant device.

HSMs act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world. They are used to protect transactions, identities, and applications, as HSMs excel at securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services for a wide range of applications.

Virtual HSM is a software-based solution that provides the same functionality as a physical HSM but in a virtualized environment. It offers the benefits of an HSM but with the flexibility and scalability of a cloud-based solution.

Key features of HSMs include:

  • Physical Tamper Resistance: HSMs are designed to be tamper-resistant, providing a high level of physical security.

  • Strong Authentication: HSMs implement strong access controls to prevent unauthorized users from accessing sensitive cryptographic material.

  • Key Management: HSMs can generate, rotate, and protect keys. The keys generated by the HSM are always random.

  • Secure Cryptographic Operations: All cryptographic operations occur within the HSM, providing a secure environment for these operations.

HSMs are available in different types, including general-purpose HSMs and payment HSMs. General-purpose HSMs use common encryption algorithms and are mainly used with crypto wallets, public key infrastructure (PKI), and in the security of basic sensitive data. Payment HSMs are designed to protect credit and payment card information, as well as other sensitive information involved in financial transactions.

Virtual HSM