CTO Sessions: Cloud HSM Best Practices



Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to the cloud—namely their roots of trust.

 

Hardware security modules (HSMs) are used as a root of trust and generate, store, protect, and manage cryptographic keys used to secure sensitive data and critical applications. HSMs are traditionally deployed on-premises but they can be safely deployed via the cloud to address certain use cases.

 

This webcast covered the best practices for deploying a cloud HSM. Thales TCT and XTec’s crypto experts discussed:

  • Cloud HSM security and compliance checklist
  • Benefits of deploying a cloud HSM
  • Cloud HSM best-fit use cases
  • Thales TCT’s Luna as a Service FedRAMP® High authorized HSM delivered through AuthentX Cloud

Speaker and Presenter Information

Evan Pelecky, Product Manager, Cryptographic Key Management, Thales TCT

 

Heather Brooks, Program Manager, XTec

Relevant Government Agencies

Other Federal Agencies, Federal Government


Register


Register


Event Type
On-Demand Webcast


This event has no exhibitor/sponsor opportunities


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Organizer
Thales TCT Government Team at Carahsoft


Contact Event Organizer



Return to search results