What is HSM?

Systems Management > HSM Key Protection

Hardware Security Module (HSM) is a designated cryptographic component located in a network or connected directly to a server. This component is the basis for building an organizational PKI infrastructure.
The HSM components are the basis for building the entire organizational trust infrastructure, and accordingly of course, the security and protection level must be uncompromising. The three protection layers must be examined by external laboratories authorized by the NIST (the American National Institute of Standards and Technology) and the components must be approved according to FIPS 140.

HSM components are responsible for:

Safe organizational private key tampering (the chief signatory).
Private key protection in three security layers.
Safe encrypted key lifespan management (access/export/backup/replace/delete, etc.).

PIC

Comda has many years experience in installing various HSM products for organizations with different needs, from storing private keys for digital certificate issuing systems to complex sealing systems. HSM products have efficient management characteristics which allow managing the component operation remotely, except for activities connected to the encryption itself, which require physical access and use through strong authentication, such as smart keys before the HSM itself.

As part of strengthening the component, it is situated in a protected box, requires multiple authentication and encrypts the keys in complex algorithms. As representatives of the world’s leading manufacturers in this field, and from its extensive activities, Comda enjoys widespread support and cooperation from the manufacturers, and in this way clients benefit from this advantage.