HSM and Key Management

HSMs A Hardware Security Module (HSM) securely stores secret key material. They are similar to large-storage, multisession smart cards. However, unlike smart cards, they are used mainly on the server side of a system. are devices that create and maintain private keys in a secure manner.  The private keys are never made available outside of the HSMs and the device destroys its contents in the event of someone attempting to gain access to the private keys.

It is recommended that any sensitive device in the environment should generate its keys using a HSM.  Devices that are typically considered as security-sensitive include the following:

  • Certificate Authorities

  • Web servers

  • ActivID CMS

As its name implies, host-attached HSMs are devices that are directly attached to a host. These HSMs are attached to the ActivID CMS servers using a PCI card. ActivID CMS also supports a number of networked-based HSMs. The HSMs for ActivID CMS are managed by ActivID Key Management System (KMS). ActivID KMS and its tools are able to initialize, clone, and load the HSM as required. The ActivID CMS HSMs store and generate the following keys:

HSM Protection

A proper use of cryptographic keys is in most cases the right way to meet the ActivID CMS confidentiality and integrity objectives. It is therefore essential to control ownership of keys and HSM at all times. To protect the keys used in the ActivID CMS environment, every private key should be generated, stored, and protected by a HSM. In addition, all access to the HSMs should be audited, logged, and checked by multiple parties and no single individual should ever have access to or be able to access the HSM directly.

One assurance that should be obtained is that the HSM has been under control by the organization at all times. Therefore, it is critically important to maintain records of HSM movements.

Another assurance that should be obtained is that the HSM configuration and key content is exactly what ActivID CMS expects. Make sure that you carefully follow the HSM recycling guidelines.

All records shall be kept whenever HSMs are removed or disconnected from ActivID CMS for maintenance or for any other reasons. Also, keys should be changed whenever an HSM is put back in the system, and the PIN should be changed if it has been used outside of the regular environment.

Note: The principles mentioned in this documentation only relate to the HSMs that are used to protect the private keys used by ActivID CMS.
Other components such as the HSMs used to protect the Certificate Authorities and Web servers are considered to be outside the scope of this documentation.

ActivID CMS-Related Security Considerations

To ensure the integrity of the HSMs, it is recommended that a separate standalone system be used to manage and maintain the HSM. At no point should the ActivID Key Management System (KMS) software be installed on the ActivID CMS server. 

Once the HSMs are initialized, the hard disks of the standalone system should be stored in a secure manner and any access to them should be logged appropriately. In addition, the ActivID KMS failsafe.cfg file and the site keys should be stored in a secure location. In combination with the previous recommendations, performing the following processes in this section is required to secure the environment.