How do HSMs manage hardware security?

Article author
Nikola

Qredo’s data centers consist of machines that house HSMs (Hardware Security Modules). Each machine has a tamper-proof HSM (Hardware Security Module) that protects the seed value and the public/private keys from attacks in a physical environment.

The HSMs adhere to the FIPS (Federal Information Processing Standard Publication 140-2) security standard. FIPS 140-2 is a US government computer security standard for cryptographic modules which ensures that cryptographic keys and primitives never leave the hardware appliances that they exist in.

Was this article helpful?