EasyManua.ls Logo

Entrust nShield - 3.2. HSM environment controls

Entrust nShield
90 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
The Security World technology makes sure that keys remain secure throughout their life
cycle. Every key in the Security World is always protected by another key, even during
recovery and replacement operations. Because the Security World is built around nShield
key-management modules, keys are only ever available in plain text on secure hardware.
nShield Connect and nShield Solo HSMs also provide a secure environment for running
sensitive applications. The CodeSafe option lets you execute code within nShield
boundaries, protecting your applications and the data they process. The CodeSafe area
occurs outside of the module area that is FIPS 140-2 Level 2 and 3 approved.
The nShield HSM is used to protect sensitive keys, data and optionally applications. It can
only operate securely if its environment provides the procedural security that it requires
and if its security enforcing functions are utilized appropriately.
When configured correctly the nShield HSM provides encryption, digital signing and key
management services in support of confidentiality and integrity requirements for your
data. The nShield HSM is not designed to be completely resistant to denial of service
attacks - these can be addressed by other aspects of the system design if warranted by
the threat and impact assessments.
3.2. HSM environment controls
You must exercise due diligence to ensure that the environment within which the nShield
HSMs are deployed is configured properly and is regularly examined as part of a
comprehensive risk mitigation program to assess both logical and physical threats. The
nShield® Security Manual 11 of 90

Table of Contents

Other manuals for Entrust nShield

Related product manuals