15.2.8 HSM Servers

This section provides information about User and Manufacturer HSM servers: purpose, deployment scenarios, and the key management scheme.

HSM servers provide a protected security environment that allows SPPS to:

  • Generate and protect user encryption and pass keys, base keys, random nonces, and so on.
    • Application keys and their associated metadata are stored as encrypted key tokens on the HSM-server mass storage device (for example, hard drive)
  • Execute cryptographic algorithms and protocols making use of the protected keys:

Secured key handling and protocol execution is done by the SEE firmware running inside the HSM hardware module (see Use of Hardware Security Modules (HSM)).