CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust.
Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed via the cloud to address certain use cases.
This webcast covered the best practices for deploying a cloud HSM. Thales TCT and XTec’s crypto experts discussed:
- Cloud HSM security and compliance checklist
- Benefits of deploying a cloud HSM
- Cloud HSM best-fit use cases
- Thales TCT’s Luna as a Service FedRAMP® High authorized HSM delivered through AuthentX Cloud
Speaker Details
Evan Pelecky, Product Manager, Cryptographic Key Management, Thales TCT
Heather Brooks, Program Manager, XTec
Event Topic
Cloud Computing, Data Center / Infrastructure, SecurityRelevant Audiences
All Federal GovernmentOther Agency
Other Federal Agencies
Event Type
On-Demand
Event Subtype
Webinar / Webcast
Registration Cost
Complimentary