<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
Security & Compliance

CloudHSM Bring Your Own Key

Managed hardware security module (HSM) in the cloud

Securosys CloudHSM provides cloud-based hardware security modules (HSMs) for generating and using your own encryption keys with your applications. With CloudHSM, you can manage your own encryption keys using FIPS 140-2 Level 3 validated HSMs designed & built by Securosys.

How it works

Securosys CloudHSM stores your keys in your HSMs in the cloud. It easily & securely integrates with your application using industry-standard APIs.

Benefits and features

Work with an open HSM built on industry standards

Securosys CloudHSM operates on a patented proprietary hardware and software architecture, meticulously crafted and sustained in-house, ensuring end-to-end control without any intermediaries.

Easy to manage and scale

Securosys CloudHSM automates time-consuming HSM administrative tasks, such as hardware provisioning, software patching, high availability, and backups. You can quickly add and remove HSMs from your cluster on-demand. Securosys Cloud automatically load balances requests and securely duplicates keys stored in any HSM to all HSMs in the cluster.

Configure your keys within minutes

Your HSMs can easily connect with your existing systems without any setup or hardware evaluation. CloudHSM is preconfigured to offer a 24/7 service and an installation within minutes. You can use industry-standard APIs, such as REST, PKCS#11, Java Cryptography Extensions (JCE), and Microsoft CryptoNG (CNG) libraries.

Geo-redundant locations

Your HSMs remain accessible even in the event of an elementary damage. They are mirrored at 3 geographically separate locations, one of them located in an underground data center total shielding against electromagnetic pulses (EMP/HMP, BSI zone 3 / NATO zone 2).

Access your key at anytime

Your keys are stores in two data centers and in a backup location ensuring maximum availability and zero downtime. Every location offers a double internet access (multi-homed).

Keep control of your encryption keys

Securosys CloudHSM provides secure access to your HSMs so you can create users and set HSM policies. The encryption keys that you generate and use with CloudHSM are accessible only by the HSM users that you specify. Securosys has no visibility or access to your encryption keys.

Getting started

Select a cluster for your HSM.

Switzerland
1h

ch01-api.cloudshsm.com

ch02-api.cloudshsm.com

Proceed to the checkout to generate a pricing offer and adjust your currency & VAT.

Pricing

You pay a monthly fee for the Bring Your Own Key (BYOK) service package with up to 3 key objects per partition.

Included: attestation, setup, maintenance and support.