CTO Sessions: Cloud HSM Best Practices
Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust.
Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed via the cloud to address certain use cases.
This webcast covered the best practices for deploying a cloud HSM. Thales TCT and XTec’s crypto experts discussed:
- Cloud HSM security and compliance checklist
- Benefits of deploying a cloud HSM
- Cloud HSM best-fit use cases
- Thales TCT’s Luna as a Service FedRAMP® High authorized HSM delivered through AuthentX Cloud
Speaker and Presenter Information
Evan Pelecky, Product Manager, Cryptographic Key Management, Thales TCT
Heather Brooks, Program Manager, XTec
Relevant Government Agencies
Other Federal Agencies, Federal Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
Thales TCT Government Team at Carahsoft