You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/dedicated-hsm/deployment-architecture.md
+30-6Lines changed: 30 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,22 +10,46 @@ ms.workload: identity
10
10
ms.tgt_pltfrm: na
11
11
ms.devlang: na
12
12
ms.topic: how-to
13
-
ms.date: 02/05/2020
14
-
ms.author: mbaldwin
13
+
ms.date: 03/25/2021
14
+
ms.author: keithp
15
15
16
16
---
17
17
18
18
# Azure Dedicated HSM deployment architecture
19
19
20
20
Azure Dedicated HSM provides cryptographic key storage in Azure. It meets stringent security requirements. Customers will benefit from using Azure Dedicated HSM if they:
21
21
22
-
* Must meet FIPS 140-2 Level 3 certification
22
+
* Must meet [FIPS 140-2 Level-3](https://csrc.nist.gov/publications/detail/fips/140/2/final) certification
23
23
* Require that they have exclusive access to the HSM
24
24
* should have complete control of their devices
25
25
26
26
The HSMs are distributed across Microsoft’s data centers and can be easily provisioned as a pair of devices as the basis of a highly available solution. They may also be deployed across regions for a disaster resilient solution. The regions with Dedicated HSM available currently can be checked using the [Products by Region page](https://azure.microsoft.com/global-infrastructure/services/?products=azure-dedicated-hsm).
27
27
28
-
Each of the regions has HSM racks deployed in either two independent data centers or at least two independent availability zones. For example, South East Asia has three availability zones and East US 2 has two. There is a total of eight regions across Europe, Asia, and the USA that offer the Dedicated HSM service and this changes as we add new HSM racks in new regions. For more information on Azure regions, see the official [Azure regions information](https://azure.microsoft.com/global-infrastructure/regions/).
28
+
* East US
29
+
* East US 2
30
+
* West US
31
+
* West US 2
32
+
* South Central US
33
+
* Southeast Asia
34
+
* East Asia
35
+
* India Central
36
+
* India South
37
+
* Japan East
38
+
* Japan West
39
+
* North Europe
40
+
* West Europe
41
+
* UK South
42
+
* UK West
43
+
* Canada Central
44
+
* Canada East
45
+
* Australia East
46
+
* Australia Southeast
47
+
* Switzerland North
48
+
* Switzerland West
49
+
* US Gov Virginia
50
+
* US Gov Texas
51
+
52
+
Each of these regions has HSM racks deployed in either two independent data centers or at least two independent availability zones. South East Asia has three availability zones and East US 2 has two. There is a total of twenty three regions across Europe, Asia, and North America that offer the Dedicated HSM service. For more information on Azure regions, see the official [Azure regions information](https://azure.microsoft.com/global-infrastructure/regions/).
29
53
Some design factors for any Dedicated HSM-based solution are location/latency, high availability, and support for other distributed applications.
30
54
31
55
## Device location
@@ -34,15 +58,15 @@ Optimal HSM device location is in closest proximity to the applications performi
34
58
35
59
## High availability
36
60
37
-
To achieve high availability, a customer must use two HSM devices in a region that are configured using Thanles software as a high availability pair. This type of deployment ensures the availability of keys if a single device experiences a problem preventing it from processing key operations. It also significantly reduces risk when performing break/fix maintenance such as power supply replacement. It is important for a design to account for any kind of regional level failure. Regional level failures can happen when there are natural disasters such as hurricanes, floods, or earthquakes. These types of events should be mitigated by provisioning HSM devices in another region. Devices deployed in another region may be paired together via Thales software configuration. This means that the minimum deployment for a highly available and disaster resilient solution is four HSM devices across two regions. Local redundancy and redundancy across regions can be used as a baseline to add any further HSM device deployments to support latency, capacity or to meet other application-specific requirements.
61
+
To achieve high availability, a customer must use two HSM devices in a region that are configured using Thales software as a high availability pair. This type of deployment ensures the availability of keys if a single device experiences a problem preventing it from processing key operations. It also significantly reduces risk when performing break/fix maintenance such as power supply replacement. It is important for a design to account for any kind of regional level failure. Regional level failures can happen when there are natural disasters such as hurricanes, floods, or earthquakes. These types of events should be mitigated by provisioning HSM devices in another region. Devices deployed in another region may be paired together via Thales software configuration. This means that the minimum deployment for a highly available and disaster resilient solution is four HSM devices across two regions. Local redundancy and redundancy across regions can be used as a baseline to add any further HSM device deployments to support latency, capacity or to meet other application-specific requirements.
38
62
39
63
## Distributed application support
40
64
41
65
Dedicated HSM devices are typically deployed in support of applications that need to perform key storage and key retrieval operations. Dedicated HSM devices have 10 partitions for independent application support. Device location should be based on a holistic view of all applications that need to use the service.
42
66
43
67
## Next steps
44
68
45
-
Once deployment architecture is determined, most configuration activities to implement that architecture will be provided by Thales. This includes device configuration as well as application integration scenarios. For more information, use the [Thales customer support](https://supportportal.gemalto.com/csm/) portal and download administration and configuration guides. The Microsoft partner site has a variety of integration guides.
69
+
Once deployment architecture is determined, most configuration activities to implement that architecture will be provided by Thales. This includes device configuration as well as application integration scenarios. For more information, use the [Thales customer support](https://supportportal.thalesgroup.com/csm) portal and download administration and configuration guides. The Microsoft partner site has a variety of integration guides.
46
70
It is recommended that all key concepts of the service, such as high availability and security for example, are well understood before device provisioning or application design and deployment.
Copy file name to clipboardExpand all lines: articles/dedicated-hsm/faq.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.tgt_pltfrm: na
12
12
ms.devlang: na
13
13
ms.topic: conceptual
14
-
ms.date: 12/10/2020
14
+
ms.date: 03/25/2021
15
15
ms.author: keithp
16
16
#Customer intent: As an IT Pro, Decision maker I am looking for key storage capability within Azure Cloud that meets FIPS 140-2 Level 3 certification and that gives me exclusive access to the hardware.
17
17
@@ -28,11 +28,11 @@ A Hardware Security Module (HSM) is a physical computing device used to safeguar
28
28
29
29
### Q: What is the Azure Dedicated HSM offering?
30
30
31
-
Azure Dedicated HSM is a cloud-based service that provides HSMs hosted in Azure datacenters that are directly connected to a customer's virtual network. These HSMs are dedicated network appliances (Thales Network Luna HSM 7). They are deployed directly to a customers' private IP address space and Microsoft does not have any access to the cryptographic functionality of the HSMs. Only the customer has full administrative and cryptographic control over these devices. Customers are responsible for the management of the device and they can get full activity logs directly from their devices. Dedicated HSMs help customers meet compliance/regulatory requirements such as FIPS 140-2 Level 3, HIPAA, PCI-DSS, and eIDAS and many others.
31
+
Azure Dedicated HSM is a cloud-based service that provides HSMs hosted in Azure datacenters that are directly connected to a customer's virtual network. These HSMs are dedicated [Thales Luna 7 HSM](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms) network appliances. They are deployed directly to a customers' private IP address space and Microsoft does not have any access to the cryptographic functionality of the HSMs. Only the customer has full administrative and cryptographic control over these devices. Customers are responsible for the management of the device and they can get full activity logs directly from their devices. Dedicated HSMs help customers meet compliance/regulatory requirements such as FIPS 140-2 Level 3, HIPAA, PCI-DSS, and eIDAS and many others.
32
32
33
33
### Q: What hardware is used for Dedicated HSM?
34
34
35
-
Microsoft has partnered with Thales to deliver the Azure Dedicated HSM service. The specific device used is the [Thales Network Luna HSM 7](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms). This device not only provides FIPS 140-2 Level 3 validated firmware, but also offers low-latency, high performance, and high capacity via 10 partitions.
35
+
Microsoft has partnered with Thales to deliver the Azure Dedicated HSM service. The specific device used is the [Thales Luna 7 HSM model A790](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms). This device not only provides [FIPS 140-2 Level-3](https://csrc.nist.gov/publications/detail/fips/140/2/final) validated firmware, but also offers low-latency, high performance, and high capacity via 10 partitions.
36
36
37
37
### Q: What is an HSM used for?
38
38
@@ -44,7 +44,7 @@ Customers can provision HSMs in specific regions using PowerShell or command-lin
44
44
45
45
### Q: What software is provided with the Dedicated HSM service?
46
46
47
-
Thales supplies all software for the HSM device once provisioned by Microsoft. The software is available at the [Thales customer support portal](https://supportportal.gemalto.com/csm/). Customers using the Dedicated HSM service are required to be registered for Thales support and have a Customer ID that enables access and download of relevant software. The supported client software is version 7.2, which is compatible with the FIPS 140-2 Level 3 validated firmware version 7.0.3.
47
+
Thales supplies all software for the HSM device once provisioned by Microsoft. The software is available at the [Thales customer support portal](https://supportportal.thalesgroup.com/csm). Customers using the Dedicated HSM service are required to be registered for Thales support and have a Customer ID that enables access and download of relevant software. The supported client software is version 7.2, which is compatible with the FIPS 140-2 Level 3 validated firmware version 7.0.3.
48
48
49
49
### Q: What extra costs may be incurred with Dedicated HSM service?
50
50
@@ -59,11 +59,11 @@ At this time, Azure Dedicated HSM only provides HSMs with password-based authent
59
59
60
60
### Q: Will Azure Dedicated HSM host my HSMs for me?
61
61
62
-
Microsoft only offers the Thales Network Luna HSM 7 via the Dedicated HSM service and cannot host any customer-provided devices.
62
+
Microsoft only offers the Thales Luna 7 HSM model A790 via the Dedicated HSM service and cannot host any customer-provided devices.
63
63
64
64
### Q: Does Azure Dedicated HSM support payment (PIN/EFT) features?
65
65
66
-
The Azure Dedicated HSM service uses Thales Network Luna HSM 7 devices. These devices do not support payment HSM-specific functionality (such as PIN or EFT) or certifications. If you would like Azure Dedicated HSM service to support payment HSMs in future, pass on the feedback to your Microsoft Account Representative.
66
+
The Azure Dedicated HSM service uses Thales Luna 7 HSMs. These devices do not support payment HSMspecific functionality (such as PIN or EFT) or certifications. If you would like Azure Dedicated HSM service to support Payment HSMs in future, pass on the feedback to your Microsoft Account Representative.
67
67
68
68
### Q: Which Azure regions is Dedicated HSM available in?
69
69
@@ -97,7 +97,7 @@ As of late March 2019, Dedicated HSM is available in the 14 regions listed below
97
97
98
98
### Q: How does my application connect to a Dedicated HSM?
99
99
100
-
You use Thales provided HSM client tools/SDK/software to perform cryptographic operations from your applications. The software is available at the [Thales customer support portal](https://supportportal.gemalto.com/csm/). Customers using the Dedicated HSM service are required to be registered for Thales support and have a Customer ID that enables access and download of relevant software.
100
+
You use Thales provided HSM client tools/SDK/software to perform cryptographic operations from your applications. The software is available at the [Thales customer support portal](https://supportportal.thalesgroup.com/csm). Customers using the Dedicated HSM service are required to be registered for Thales support and have a Customer ID that enables access and download of relevant software.
101
101
102
102
### Q: Can an application connect to Dedicated HSM from a different VNET in or across regions?
103
103
@@ -113,7 +113,7 @@ No. Azure Dedicated HSMs are only accessible from inside your virtual network.
113
113
114
114
### Q: Can I import keys from an existing On-premises HSM to Dedicated HSM?
115
115
116
-
Yes, if you have on-premises Thales Network Luna HSM 7 HSMs. There are multiple methods. Refer to the [Thales HSM documentation](https://thalesdocs.com/gphsm/luna/7.2/docs/network/Content/Home_network.htm).
116
+
Yes, if you have on-premises Thales Luna 7 HSMs. There are multiple methods. Refer to the [Thales HSM documentation](https://thalesdocs.com/gphsm/luna/7.2/docs/network/Content/Home_network.htm).
117
117
118
118
### Q: What operating systems are supported by Dedicated HSM client software?
119
119
@@ -126,7 +126,7 @@ To have high availability, you need to set up your HSM client application config
126
126
127
127
### Q: What authentication mechanisms are supported by Dedicated HSM?
128
128
129
-
Azure Dedicated HSM uses SafeNet Network HSM 7 appliances (model A790) and they support password-based authentication.
129
+
Azure Dedicated HSM uses [Thales Luna 7 HSM model A790](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms) devices and they support password-based authentication.
130
130
131
131
### Q: What SDKs, APIs, client software is available to use with Dedicated HSM?
132
132
@@ -203,7 +203,7 @@ Yes. High availability configuration and setup are performed in the HSM client s
203
203
204
204
### Q: Can I add HSMs from my on-premises network to a high availability group with Azure Dedicated HSM?
205
205
206
-
Yes. They must meet the high availability requirements for SafeNet Luna Network HSM 7.
206
+
Yes. They must meet the high availability requirements for [Thales Luna 7 HSMs](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms)
207
207
208
208
### Q: Can I add Luna 5/6 HSMs from on-premises networks to a high availability group with Azure Dedicated HSM?
209
209
@@ -225,7 +225,7 @@ Azure datacenters have extensive physical and procedural security controls. In a
225
225
226
226
### Q: What happens if there is a security breach or hardware tampering event?
227
227
228
-
Dedicated HSM service uses Thales Network Luna HSM 7 appliances. These appliances support physical and logical tamper detection. If there is ever a tamper event the HSMs are automatically zeroized.
228
+
Dedicated HSM service uses [Thales Luna 7 HSM](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms)appliances. These devices support physical and logical tamper detection. If there is ever a tamper event the HSMs are automatically zeroized.
229
229
230
230
### Q: How do I ensure that keys in my Dedicated HSMs are not lost due to error or a malicious insider attack?
231
231
@@ -235,7 +235,7 @@ It is highly recommended to use an on-premises HSM backup device to perform regu
235
235
236
236
Support is provided by both Microsoft and Thales. If you have an issue with the hardware or network access, raise a support request with Microsoft and if you have an issue with HSM configuration, software, and application development raise a support request with Thales. If you have an undetermined issue, raise a support request with Microsoft and then Thales can be engaged as required.
237
237
238
-
### Q: How do I get the client software, documentation and access to integration guidance for the Thales Network Luna HSM 7?
238
+
### Q: How do I get the client software, documentation and access to integration guidance for the Thales Luna 7 HSM?
239
239
240
240
After registering for the service, a Thales Customer ID will be provided that allows for registration in the Thales customer support portal. This will enable access to all software and documentation as well as enabling support requests directly with Thales.
241
241
@@ -251,11 +251,11 @@ The HSM has a command-line reboot option, however, we are experiencing issues wh
251
251
252
252
### Q: Is it safe to store encryption keys for my most important data in Dedicated HSM?
253
253
254
-
Yes, Dedicated HSM provisions Thales Network Luna HSM 7 appliances that use FIPS 140-2 Level 3 validated HSMs.
254
+
Yes, Dedicated HSM provisions Thales Luna 7 HSMs that are [FIPS 140-2 Level-3](https://csrc.nist.gov/publications/detail/fips/140/2/final) validated.
255
255
256
256
### Q: What cryptographic keys and algorithms are supported by Dedicated HSM?
257
257
258
-
Dedicated HSM service provisions Thales Network Luna HSM 7 appliances. They support a wide range of cryptographic key types and algorithms including:
258
+
Dedicated HSM service provisions Thales Luna 7 HSM appliances. They support a wide range of cryptographic key types and algorithms including:
259
259
Full Suite B support
260
260
261
261
* Asymmetric:
@@ -280,11 +280,11 @@ Full Suite B support
280
280
281
281
### Q: Is Dedicated HSM FIPS 140-2 Level 3 validated?
282
282
283
-
Yes. Dedicated HSM service provisions Thales Network Luna HSM 7 appliances that use FIPS 140-2 Level 3 validated HSMs.
283
+
Yes. Dedicated HSM service provisions [Thales Luna 7 HSM model A790](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms)appliances that are [FIPS 140-2 Level-3](https://csrc.nist.gov/publications/detail/fips/140/2/final) validated.
284
284
285
285
### Q: What do I need to do to make sure I operate Dedicated HSM in FIPS 140-2 Level 3 validated mode?
286
286
287
-
The Dedicated HSM service provisions Thales Network Luna HSM 7 appliances. These appliances use FIPS 140-2 Level 3 validated HSMs. The default deployed configuration, operating system, and firmware are also FIPS validated. You do not need to take any action for FIPS 140-2 Level 3 compliance.
287
+
The Dedicated HSM service provisions Thales Luna 7 HSM appliances. These devices are FIPS 140-2 Level 3 validated HSMs. The default deployed configuration, operating system, and firmware are also FIPS validated. You do not need to take any action for FIPS 140-2 Level 3 compliance.
288
288
289
289
### Q: How does a customer ensure that when an HSM is deprovisioned all the key material is wiped out?
290
290
@@ -294,15 +294,15 @@ Before requesting deprovisioning, a customer must have zeroized the HSM using Th
294
294
295
295
### Q: How many cryptographic operations are supported per second with Dedicated HSM?
296
296
297
-
Dedicated HSM provisions Thales Network Luna HSM 7 HSMs. Here's a summary of maximum performance for some operations:
297
+
Dedicated HSM provisions Thales Luna 7 HSMs. Here's a summary of maximum performance for some operations:
298
298
299
299
* RSA-2048: 10,000 transactions per second
300
300
* ECC P256: 20,000 transactions per second
301
301
* AES-GCM: 17,000 transactions per second
302
302
303
303
### Q: How many partitions can be created in Dedicated HSM?
304
304
305
-
The SafeNet Luna HSM 7 model A790 used includes a license for 10 partitions in the cost of the service. The device has a limit of 100 partitions and adding partitions up to this limit would incur extra licensing costs and require installation of a new license file on the device.
305
+
The [Thales Luna 7 HSM model A790](https://cpl.thalesgroup.com/encryption/hardware-security-modules/network-hsms) used includes a license for 10 partitions in the cost of the service. The device has a limit of 100 partitions and adding partitions up to this limit would incur extra licensing costs and require installation of a new license file on the device.
306
306
307
307
### Q: How many keys can be supported in Dedicated HSM?
0 commit comments