Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions: Cloud HSM Best Practices

Documents

Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust.

Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed via the cloud to address certain use cases.

Watch a replay of this webcast to learn about the best practices for deploying a cloud HSM. Thales TCT and XTec’s crypto experts will discuss:

  • A checklist for Cloud HSM security and compliance
  • Benefits of deploying a cloud HSM
  • Cloud HSM best-fit use cases
  • Thales TCT’s Luna as a Service FedRAMP® High authorized HSM delivered through AuthentX Cloud