Virtual HSM
Home
  • Virtual HSM
  • Documentation
    • What is Virtual HSM?
    • Use Case: Attested Secret Provisioning in the Cloud
    • Setup
      • Install
      • vHSM Server Configuration
        • Parameters
        • vHSM Telemetry Parameters
      • vHSM Agent
        • Agent Configuration
      • vHSM Proxy
        • Proxy Configuration
    • Get Started
      • Start the Vault server
      • MariaDB root admin password provisioning on Azure DCXas_v5 VM
    • Supported Cloud Configurations
  • Tutorials
    • Deploying the vhsm Container on an EC2 Instance
    • CLI quickstart
    • vHSM Agent quickstart
    • vHSM Proxy quickstart
    • Passing vHSM secrets using ConfigMaps
    • Provisioning MariaDB Password on Azure DCXas_v5 VM
    • Registering a buckypaper plugin
    • Monitoring vHSM with Grafana
  • Integration with Utimaco SecurityServer
    • Integrate enclaive vHSM with Utimaco HSM
  • API
    • Auth
    • Default
    • Secrets
    • System
    • Identity
    • Models
  • vHSM CLI
    • Server and Infrastructure Management
      • vhsm server
      • vhsm proxy
      • vhsm monitor
      • vhsm status
      • vhsm agent
    • Secret Management
      • vhsm read
      • vhsm write
      • vhsm delete
      • vhsm list
      • vhsm secrets
        • vhsm secrets enable
        • vhsm secrets disable
        • vhsm secrets list
        • vhsm secrets move
        • vhsm secrets tune
      • vhsm unwrap
    • Configuration and Management
      • vhsm plugin
        • vhsm plugin info
        • vhsm plugin deregister
        • vhsm plugin list
        • vhsm plugin register
        • vhsm plugin reload
        • vhsm plugin reload-status
      • vhsm namespace
      • vhsm operator
      • vhsm print
      • vhsm path-help
      • vhsm lease
    • Auditing and Debugging
      • vhsm audit
      • vhsm debug
    • Attestation
    • Security and Encryption
      • vhsm pki
        • vhsm pki health-check
        • vhsm pki issue
        • vhsm pki list-intermediates
        • vhsm pki reissue
        • vhsm pki verify-sign
      • vhsm transit
      • vhsm ssh
      • vhsm transform
    • Authentication and Authorization
      • vhsm login
      • vhsm auth
      • vhsm token
      • vhsm policy
    • Storage and Data Mangement
      • vhsm kv
      • vhsm patch
    • vhsm version
      • vhsm version-history
  • Troubleshooting
    • CA Validity Period
    • CRL Validity Period
    • Root Certificate Issued Non-CA Leaves
    • Role Allows Implicit Localhost Issuance
    • Role Allows Glob-Based Wildcard Issuance
    • Performance Impact
    • Accessibility of Audit Information
    • Allow If-Modified-Since Requests
    • Auto-Tidy Disabled
    • Tidy Hasn't Run
    • Too Many Certificates
    • Enable ACME Issuance
    • ACME Response Headers Configuration
  • Resources
    • Community
    • GitHub
    • Youtube
    • CCx101 wiki
Powered by GitBook
On this page
  • enclaive Virtual HSM
  • Utimaco u.trust Anchor
  • Software Requirements
  • Hardware Requirements

Was this helpful?

Integration with Utimaco SecurityServer

Learn about integrating Enclaive vHSM with Utimaco Security Server and how their combined capabilities strengthen cryptographic security, key management, and data protection.

enclaive Virtual HSM

Hardware Security Modules (HSMs) are specialized physical devices designed to protect cryptographic keys and sensitive data. Unlike software-based solutions, HSMs provide enhanced security through tamper-resistant and physically protected hardware.

However, traditional HSMs are limited in their ability to scale flexibly based on demand. In cloud environments, where scalability is essential, adding more physical HSMs may not align with the agility required by modern applications.

enclaive Virtual HSM (vHSM) bridges the gap between hardware security and software flexibility. It delivers the same high level of trust and security as traditional HSMs while leveraging the agility of enclaive. The trust foundation is anchored in hardware, using Utimaco u.trust Anchor GP HSM or HSM as a Service (HSMaaS) as a secure base. Additionally, Enclaive’s confidential boot and attestation technology ensures integrity and security at every stage.

Utimaco u.trust Anchor

The u.trust Anchor is a next-generation Hardware Security Module (HSM) developed by Utimaco IS GmbH. It is a physically protected, specialized computing unit designed to support true multi-tenancy, enabling secure execution of sensitive cryptographic operations. The HSM ensures the safe management and storage of cryptographic keys and data, making it a universal and independent security component for diverse computing environments.

The Utimaco u.trust Anchor GP HSM plays a crucial role in enclaive vHSM, providing randomness generation and secure secret unsealing, ensuring a strong foundation of trust and security.

Software Requirements

HSM Utility

PKCS#11 Tool Version 2 (p11tool2)

HSM Interfaces

SecurityServer PKCS#11 Provider

Hardware Requirements

Utimaco LAN HSM

u.trust Anchor Se*k and CSAR LAN with firmware 4.70.0.0 or higher

Utimaco PCIe HSM

u.trust Anchor Se*k and CSAR Series PCIe with firmware 4.70.0.0 or higher

Utimaco HSMaaS

General Purpose HSM as a Service

PreviousMonitoring vHSM with GrafanaNextIntegrate enclaive vHSM with Utimaco HSM

Last updated 2 months ago

Was this helpful?