Hsm Environment Controls - Entrust nShield Security Manual

Hide thumbs Also See for nShield:
Table of Contents

Advertisement

The Security World technology makes sure that keys remain secure throughout their life
cycle. Every key in the Security World is always protected by another key, even during
recovery and replacement operations. Because the Security World is built around nShield
key-management modules, keys are only ever available in plain text on secure hardware.
nShield Connect and nShield Solo HSMs also provide a secure environment for running
sensitive applications. The CodeSafe option lets you execute code within nShield
boundaries, protecting your applications and the data they process. The CodeSafe area
occurs outside of the module area that is FIPS 140-2 Level 2 and 3 approved.
The nShield HSM is used to protect sensitive keys, data and optionally applications. It can
only operate securely if its environment provides the procedural security that it requires
and if its security enforcing functions are utilized appropriately.
When configured correctly the nShield HSM provides encryption, digital signing and key
management services in support of confidentiality and integrity requirements for your
data. The nShield HSM is not designed to be completely resistant to denial of service
attacks - these can be addressed by other aspects of the system design if warranted by
the threat and impact assessments.

3.2. HSM environment controls

You must exercise due diligence to ensure that the environment within which the nShield
HSMs are deployed is configured properly and is regularly examined as part of a
comprehensive risk mitigation program to assess both logical and physical threats. The
nShield® Security Manual
11 of 90

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the nShield and is the answer not in the manual?

Questions and answers

Table of Contents