CTO Sessions: Cloud HSM Best Practices

Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust.

 

Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed via the cloud to address certain use cases.

 

This webcast covered the best practices for deploying a cloud HSM. Thales TCT and XTec’s crypto experts discussed:

  • Cloud HSM security and compliance checklist
  • Benefits of deploying a cloud HSM
  • Cloud HSM best-fit use cases
  • Thales TCT’s Luna as a Service FedRAMP® High authorized HSM delivered through AuthentX Cloud

Speaker Details

Evan Pelecky, Product Manager, Cryptographic Key Management, Thales TCT

 

Heather Brooks, Program Manager, XTec

Event Topic

Cloud Computing, Data Center / Infrastructure, Security

Relevant Audiences

All Federal Government

Other Agency

Other Federal Agencies
CTO Sessions: Cloud HSM Best Practices
Event Type
On-Demand
Event Subtype
Webinar / Webcast
Registration Cost
Complimentary
Website
Click here to view event website
Organizers
Carahsoft Technology Corp.