Hardware Security Modules with KeyControl

A hardware security module (HSM) is a physical server or PCI card that stores, protects, and manages cryptographic material. An HSM is often used to do cryptographic processing as well, including the generation of secure cryptographic keys. It is used in a client-server environment, which means that the server and the client each need to be prepared in advance. As with KMIP, the advantage of an HSM is that it protects and stores critical data such as your Admin Key and any Key Encryption Keys (KEKs) you have created for your Cloud VM Sets.

When an HSM is used with BYOK, keys are never stored as plaintext. In-memory keys are also encrypted (wrapped), except for software-protected keys in Azure. When a software-protected key has to be uploaded to Azure, KeyControl unwraps it before upload. For other keys, including hardware-protected keys on Azure, when KeyControl has to upload them to the cloud, it encrypts (wraps) them in the HSM using the master key and the cloud provider's wrapping key before uploading the wrapped keys to the cloud.

KeyControl supports the following HSMs: 

  • nShield HSM
  • Luna HSM
  • Luna Cloud HSM

Requirements and Recommendations for nShield HSM Servers

The nShield HSM client version 12.60.11 is included in Entrust DataControl/KeyControl. nShield HSM servers compatible with the 12.60.11 client are supported. You can also use either the on-premise nShield HSM or nShield as a Service (nSaaS).

For additional details, see your nShield documentation.

Requirements and Recommendations for Luna HSM Servers

You can configure the nodes in your KeyControl cluster to either connect to the HSM using one certificate that they all share or with individual certificates for each node. The KeyControl nodes can also be connected to multiple HSM servers that have been configured as an HA Group to allow for High Availability. For more information, see Configuring KeyControl as a Luna HSM Client with a Single Cluster Certificate and Configuring KeyControl as a Luna HSM Client with Individual Node Certificates.

Note: If you have a Luna HSM server with the ipcheck feature enabled, you must use unique node certificates.

  • The Luna client version 10.2 is included in Entrust DataControl/KeyControl 5.1.2 and greater. Luna client 10.2 is compatible with HSMs running Luna 6.2.1 or higher.
  • Bandwidth recommendation:

    • Minimum: 10 Mbps half duplex
    • Recommended: 100 Mbps full duplex
  • Latency recommendation:

    • Maximum: 500 ms
    • Recommended: 0.5 ms
  • TCP port 1792 is required to establish a trusted connection between KeyControl and Luna. The other ports used are:

    • TCP port 22 for SSH (Secure Shell).
    • TCP port 1503 for Remote PED. This is the only configurable port.
    • UDP port 514 for the Syslog service.
    • UDP port 123 for NTP service.
    • UDP ports 161/162 for SNMP service.

For additional details, see your Luna HSM documentation.