+ All Categories
Home > Documents > nSHIELD BRING YOUR OWN KEY - Startseite - keyon … · Follow us on: Americas – Thales e-Security...

nSHIELD BRING YOUR OWN KEY - Startseite - keyon … · Follow us on: Americas – Thales e-Security...

Date post: 27-Aug-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
2
www.thales-esecurity.com CLOUD CONVENIENCE MEETS SECURITY Safer key management practices that strengthen the security of your sensitive data in the cloud Stronger key generation using nShield’s high-entropy random number generator, which is protected by FIPS-certified hardware Greater control over keys—use your own nShield HSMs in your own environment to create and securely export your keys to the cloud More consistent key management operations, whether your keys are used in the cloud or on premises <Thales e-Security> nSHIELD BRING YOUR OWN KEY With nShield hardware security modules (HSMs) from Thales e-Security, you can bring your own keys (BYOK) to your cloud applications, whether you’re using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure. nShield high-assurance HSMs enable you to continue to benefit from the flexibility and economy of cloud services, while strengthening the security of your key management practices and gaining greater control over your keys. nShield securely wraps and exports keys to the cloud. Thales’s unique Security World architecture provides secure long term storage and disaster recovery protection of master keys. High-assurance nShield HSMs generate keys on customer premises. Depending on the cloud service provider, keys are either secured in a second nShield in the cloud, or deleted by provider after validity period. Keys are available for use with sensitive cloud applications. Cloud Applications nShield HSM for secure key storage Proprietary Database
Transcript
Page 1: nSHIELD BRING YOUR OWN KEY - Startseite - keyon … · Follow us on: Americas – Thales e-Security Inc. 900 South Pine Island Road, Suite 710, Plantation,

w w w . t h a l e s - e s e c u r i t y . c o m

CLOUD CONVENIENCE MEETS SECURITYSafer key management practices that strengthen the security of your sensitive data in the cloudStronger key generation using nShield’s high-entropy random number generator, which is protected by FIPS-certified hardware

Greater control over keys—use your own nShield HSMs in your own environment to create and securely export your keys to the cloudMore consistent key management operations, whether your keys are used in the cloud or on premises

<Thales e-Security>

nSHIELD BRING YOUR OWN KEY

With nShield hardware security modules (HSMs) from Thales e-Security, you can bring your own keys (BYOK) to your cloud applications, whether you’re using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure.

nShield high-assurance HSMs enable you to continue to benefit from the flexibility and economy of cloud services, while strengthening the security of your key management practices and gaining greater control over your keys.

nShield securely wraps and

exports keys to the

cloud.

Thales’s unique Security World

architecture provides secure long term

storage and disaster recovery protection of

master keys.

High-assurance nShieldHSMs generate keys

on customer premises.

Depending on the cloud service provider, keys are either secured in a second nShield in the cloud,

or deleted by provider after validity period.

Keys are available for use with sensitive cloud

applications.

Cloud Applications

nShield HSM for secure key storage

ProprietaryDatabase

Page 2: nSHIELD BRING YOUR OWN KEY - Startseite - keyon … · Follow us on: Americas – Thales e-Security Inc. 900 South Pine Island Road, Suite 710, Plantation,

Follow us on:

Americas – Thales e-Security Inc. 900 South Pine Island Road, Suite 710, Plantation, FL 33324 USA • Tel:+1 888 744 4976 or +1 954 888 6200 • Fax:+1 954 888 6211 • E-mail: [email protected] Pacific – Thales Transport & Security (HK) Lt, Unit 4101-3, 41/F, Sunlight Tower, 248 Queen’s Road East, Wanchai, Hong Kong • Tel:+852 2815 8633 • Fax:+852 2815 8141 • E-mail: [email protected], Middle East, Africa – Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ • Tel:+44 (0)1844 201800 • Fax:+44 (0)1844 208550 • E-mail: [email protected]

<Thales e-Security>

WHAT nSHIELD BYOK DOESWith nShield BYOK, you can use your nShield HSMs to generate, store, and manage the keys you count on to secure your sensitive cloud-hosted applications, databases, and bulk storage. nShield BYOK delivers these capabilities:

Rely on hardware root of trust. Your nShield HSMs are highly reliable, FIPS 140-2 Level 3 certified, tamper-resistant devices. These HSMs serve as the root of trust of your cloud services, enabling you to safely generate and secure your encryption and signing keys Use nShield to manage your keys. When sensitive data resides in your cloud-hosted applications, you can rely on your nShield HSMs to generate and wrap your keys, and securely deliver them to your cloud applications Control the availability of your keys. Because you own and exclusively control your nShield HSMs in your own environment, you decide when keys are generated and exported. Because you retain the master copy, you also control when and whether further exports to your cloud provider occur. Choose your cloud provider. With nShield BYOK, you decide which cloud provider to use for each key. This gives you the flexibility to choose the right cloud environments for your different applications, while benefiting from nShield high-assurance key generation and protection

HOW nSHIELD BYOK WORKSThales e-Security provides the mechanisms that let you use your nShield HSMs to generate keys, secure long-term storage, and export your keys into the cloud. Once your keys are exported into the cloud, you’ll manage keys according to one of the following approaches:

If you’re using AWS or GCP… You will lease your keys to AWS or GCP for temporary use in the cloud. After a pre-determined time period, your keys in the cloud will be destroyed. If needed, you can again lease the keys stored in your HSM.

If you’re using Microsoft Azure…You will securely transfer your keys to the nShield HSM running within the Azure infrastructure, so you get HSM security at both ends.

Whichever public cloud service you choose, generating your own key and controlling its export helps you to establish strong safeguards around sensitive data and applications in the cloud.

HELPING CLOUD CUSTOMERS GAIN GREATER CONTROL OVER DATA SECURITY

© T

hale

s - M

arch

201

7 •

PLB

6293

GETTING STARTED WITH nSHIELD BYOKTo start using nShield BYOK for AWS, GCP or Azure, you will need an nShield HSM. You can choose from the following solutions:

nShield Connect, a network-attached appliance. nShield Solo, a server-embedded PCIe card. nShield Edge, a USB-connected device for low volume applications.

To use nShield BYOK with AWS or GCP, you will need the following Thales package:

Cloud Integration Option Pack This option pack contains all you need to use your on-premises nShield HSMs to generate and lease your keys to AWS or GCP.You can integrate nShield BYOK with AWS or GCP yourself, or you can use Thales Professional Services to help you get connected seamlessly and efficiently.

To use nShield BYOK with Azure, the following package is available for purchase:

Bring Your Own Key, Azure ASG Service This package includes an nShield Edge, integration delivered by the Thales Advanced Solutions Group (ASG), and one year of maintenance.

You can also purchase nShield Connect, Solo, or Edge HSMs and professional services separately.

LEARN MOREVisit us at www.thales-esecurity.com to learn more about how Thales e-Security nShield HSMs provide a wide range of cryptographic services.


Recommended