Skip to content

Commit 1479a8d

Browse files
Merge pull request #2700 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-01 17:12 UTC
2 parents 1135180 + 74e4c7a commit 1479a8d

7 files changed

Lines changed: 71 additions & 16 deletions

File tree

articles/cloud-hsm/authentication.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about various authentication methods and best practices for s
44
author: msmbaldwin
55
ms.service: azure-cloud-hsm
66
ms.topic: feature-guide
7-
ms.date: 03/20/2025
7+
ms.date: 03/31/2026
88
ms.author: mbaldwin
99
#customer intent: As a Cloud HSM administrator, I want to learn how to secure and optimize my Cloud HSM deployment so that I can ensure the highest level of security and performance.
1010
---
@@ -13,6 +13,10 @@ ms.author: mbaldwin
1313

1414
Authentication is a crucial aspect of securely accessing and operating within Azure Cloud HSM. This article outlines authentication methods, including command-line interface (CLI), PKCS#11, Java Cryptography Extension (JCE), and OpenSSL. This article also provides best practices for multithreading and session handling.
1515

16+
## Supported authentication methods
17+
18+
Azure Cloud HSM supports only password-based authentication. It doesn't support authentication through a PIN entry device (PED).
19+
1620
## Cloud HSM CLI authentication
1721

1822
You can authenticate by using CLI tools like `azcloudhsm_util` in either interactive mode or single-command mode. In interactive mode, use the `loginHSM` command. For single-command mode, include `singlecmd` and parameters for `loginHSM`. We advise you to securely store your HSM credentials when your application isn't using them.

articles/cloud-hsm/faq.yml

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
author: msmbaldwin
66
ms.service: azure-cloud-hsm
77
ms.topic: faq
8-
ms.date: 03/20/2025
8+
ms.date: 03/31/2026
99
ms.author: mbaldwin
1010
title: FAQ about Azure Cloud HSM
1111
summary: Find answers to common questions about Microsoft Azure Cloud HSM.
@@ -27,7 +27,7 @@ sections:
2727
- question: |-
2828
What hardware is used for Azure Cloud HSM?
2929
answer: |-
30-
Azure Cloud HSM uses Marvell LiquidSecurity hardware security modules. For more information about service specifications, see [Azure Cloud HSM service limits](service-limits.md).
30+
Azure Cloud HSM uses Marvell LiquidSecurity hardware security modules. For more information about hardware specifications and service limits, see [Azure Cloud HSM service limits](service-limits.md).
3131
- question: |-
3232
What software is provided with Azure Cloud HSM?
3333
answer: |-
@@ -137,7 +137,7 @@ sections:
137137
- question: |-
138138
Can I update the partition owner certificate after I upload it?
139139
answer: |-
140-
No. You can't change the partition owner certificate after you upload it. If you upload `PO.crt` in error, you need to delete your Azure Cloud HSM resource and deploy again.
140+
No, you can't change the partition owner certificate after you upload it. If you upload an incorrect certificate, you must delete the Azure Cloud HSM resource and deploy again. For details, see [User management in Azure Cloud HSM](user-management.md#protect-your-partition-owner-certificate).
141141
142142
- name: Business continuity
143143
questions:
@@ -185,17 +185,19 @@ sections:
185185
- question: |-
186186
Does Azure Cloud HSM support FIPS 140-3 Level 3?
187187
answer: |-
188-
Yes, Azure Cloud HSM offers HSMs that are validated to meet the FIPS 140-3 Level 3 standards. For procedures to verify the authenticity of your HSM, including checking the [FIPS 140-3 Level 3 certification from NIST](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4700), refer to the [onboarding guide](onboarding-guide.md). For more information about compliance, see [What is Azure Cloud HSM?](overview.md).
188+
Yes, Azure Cloud HSM offers HSMs that are validated to meet FIPS 140-3 Level 3 standards. For details, see [Compliance and certification](overview.md#compliance-and-certification).
189189
- question: |-
190190
Does Azure Cloud HSM support eIDAS?
191191
answer: |-
192-
Yes. Azure Cloud HSM supports eIDAS compliance under the Austrian scheme by providing secure key management, cryptographic operations, and FIPS 140-3 Level 3 validated hardware to meet stringent requirements for qualified electronic signatures and seals, to help ensure regulatory compliance. Learn more in the [QSCD Certificate](https://www.a-sit.at/wp-content/uploads/2024/10/VIG-19-078-QSCD-Certificate-Final_sig-HL.pdf). For more information about security standards, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
192+
Yes, Azure Cloud HSM supports eIDAS compliance under the Austrian scheme. For details, see [Compliance and certification](overview.md#compliance-and-certification).
193+
- question: |-
194+
Does Azure Cloud HSM support PCI?
195+
answer: |-
196+
Yes, Azure Cloud HSM provides HSMs that are validated to meet PCI and PCI 3DS standards. For details, see [Compliance and certification](overview.md#compliance-and-certification).
193197
- question: |-
194198
What happens if someone tampers with the HSM hardware?
195199
answer: |-
196-
Azure Cloud HSM incorporates both physical and logical tamper detection and response mechanisms that initiate key deletion (zeroization) of the hardware. These measures are designed to detect tampering if the physical barrier is compromised.
197-
198-
Additionally, HSMs are safeguarded against brute-force sign-in attacks. The system locks out cryptography officers (COs) after a set number of unsuccessful access attempts. Similarly, repeated unsuccessful attempts to access an HSM with cryptography user (CU) credentials result in locking out the user. A CO must then unlock the CU. Unlocking a CO requires `getChallenge` and signing the challenge with `PO.key` via OpenSSL, followed by `unlockCO` and `changePswd` commands. For more information about security features, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
200+
Azure Cloud HSM incorporates both physical and logical tamper detection and response mechanisms that initiate key deletion (zeroization) of the hardware. For details, see [Physical security](overview.md#physical-security).
199201
200202
- name: Support
201203
questions:
@@ -206,15 +208,15 @@ sections:
206208
- question: |-
207209
How are the HSMs used in Azure Cloud HSM protected?
208210
answer: |-
209-
Azure datacenters have extensive physical and procedural security controls. Additionally, the HSMs in Azure Cloud HSM are hosted in a restricted access area of the datacenter, with physical access controls and video surveillance for added security. For more information about physical security, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
211+
Azure datacenters have extensive physical and procedural security controls. The HSMs are hosted in a restricted access area of the datacenter with physical access controls and video surveillance. For details, see [Physical security](overview.md#physical-security).
210212
- question: |-
211213
Can Microsoft recover my keys if I lose the credentials to my HSM?
212214
answer: |-
213215
No. Microsoft doesn't have access to your keys or credentials and can't recover your keys if you lose your credentials. For more information about credential management, see [User management in Azure Cloud HSM](user-management.md).
214216
- question: |-
215217
Does Azure Cloud HSM have scheduled maintenance windows?
216218
answer: |-
217-
No, although Microsoft might need to perform maintenance for necessary upgrades or faulty hardware. We notify customers in advance if we anticipate any impact. For more information about operational considerations, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
219+
No, Azure Cloud HSM doesn't have scheduled maintenance windows. Microsoft might perform maintenance for necessary upgrades or faulty hardware replacement and notifies customers in advance of any anticipated impact. For details, see [Service operations](overview.md#service-operations).
218220
- question: |-
219221
What is the SLA for Azure Cloud HSM?
220222
answer: |-

articles/cloud-hsm/overview.md

Lines changed: 27 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how Azure Cloud HSM offers cryptographic key storage within t
44
author: keithp
55
ms.service: azure-cloud-hsm
66
ms.topic: overview
7-
ms.date: 03/20/2025
7+
ms.date: 03/31/2026
88
ms.author: keithp
99

1010
#customer intent: As an IT pro decision-maker, I'm looking for key storage capability within the Azure cloud platform that meets FIPS 140-3 Level 3 certification and that gives me exclusive access to a dedicated hardware security module.
@@ -42,9 +42,21 @@ The Azure Cloud HSM cluster supports load balancing of cryptographic operations.
4242

4343
Each Azure Cloud HSM instance is dedicated to a single customer. Each HSM cluster uses a separate customer-specific security domain that cryptographically isolates it.
4444

45-
### FIPS 140-3 Level 3 compliance
45+
## Compliance and certification
4646

47-
Many organizations have stringent industry regulations that dictate that cryptographic keys must be stored in [FIPS 140-3 Level 3](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4700) validated HSMs. Azure Cloud HSM helps customers from various industry segments (financial services industry, government agencies, and others) meet these FIPS requirements.
47+
Azure Cloud HSM meets multiple industry compliance standards and certifications to help customers satisfy regulatory requirements.
48+
49+
### FIPS 140-3 Level 3
50+
51+
Many organizations have stringent industry regulations that dictate that cryptographic keys must be stored in FIPS 140-3 Level 3 validated HSMs. Azure Cloud HSM offers HSMs that are validated to meet FIPS 140-3 Level 3 standards. For procedures to verify the authenticity of your HSM, including checking the [FIPS 140-3 Level 3 certification from NIST](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4700), refer to the [onboarding guide](onboarding-guide.md). Azure Cloud HSM helps customers from various industry segments (financial services industry, government agencies, and others) meet these FIPS requirements.
52+
53+
### eIDAS
54+
55+
Azure Cloud HSM supports eIDAS compliance under the Austrian scheme by providing secure key management, cryptographic operations, and FIPS 140-3 Level 3 validated hardware to meet stringent requirements for qualified electronic signatures and seals to help ensure regulatory compliance. Learn more in the [QSCD Certificate](https://www.a-sit.at/wp-content/uploads/2024/10/VIG-19-078-QSCD-Certificate-Final_sig-HL.pdf).
56+
57+
### PCI and PCI 3DS
58+
59+
Azure Cloud HSM provides HSMs that are validated to meet PCI and PCI 3DS standards. For more details on PCI compliance certification for Azure Cloud HSM, refer to the [PCI 3DS Attestation of Compliance (AOC)](https://servicetrust.microsoft.com/DocumentPage/c88a84bd-bb48-4fe0-b93f-b4cfb7c20ba2) in Microsoft Service Trust Center.
4860

4961
## Azure Cloud HSM suitability
5062

@@ -78,6 +90,18 @@ Azure Cloud HSM doesn't integrate with other platform as a service (PaaS) or sof
7890

7991
Azure Cloud HSM is not a good fit for Microsoft cloud services that require support for encryption with customer-managed keys. These services include Azure Information Protection, Azure Disk Encryption, Azure Data Lake Storage, Azure Storage, and Microsoft Purview Customer Key. For those scenarios, customers should use [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md).
8092

93+
## Physical security
94+
95+
Azure datacenters have extensive physical and procedural security controls. The HSMs in Azure Cloud HSM are hosted in a restricted access area of the datacenter, with physical access controls and video surveillance for added security.
96+
97+
Azure Cloud HSM incorporates both physical and logical tamper detection and response mechanisms that initiate key deletion (zeroization) of the hardware. These measures are designed to detect tampering if the physical barrier is compromised.
98+
99+
HSMs are safeguarded against brute-force sign-in attacks. The system locks out cryptography officers (COs) after a set number of unsuccessful access attempts. Similarly, repeated unsuccessful attempts to access an HSM with cryptography user (CU) credentials result in locking out the user. A CO must then unlock the CU. Unlocking a CO requires the `getChallenge` command, signing the challenge with the partition owner key (`PO.key`) via OpenSSL, followed by the `unlockCO` and `changePswd` commands.
100+
101+
## Service operations
102+
103+
Azure Cloud HSM doesn't have scheduled maintenance windows. However, Microsoft might need to perform maintenance for necessary upgrades or faulty hardware replacement. Customers are notified in advance if any impact is anticipated.
104+
81105
## Next steps
82106

83107
These resources are available to help you facilitate the provisioning and configuration of HSMs into your existing virtual network environment:

articles/cloud-hsm/secure-cloud-hsm.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,10 @@ Azure Cloud HSM is a single-tenant, FIPS 140-3 Level 3 validated service that gr
2626

2727
- **Restrict access to the Partition Owner private key**: Limit access to the Partition Owner of the Application Partition (POTA) private key (`PO.key`). The Admin of the Application Partition (AOTA) and POTA private keys are equivalent to root access and can reset passwords for cryptography officer (CO) users in a partition (AOTA for partition 0, POTA for user partitions). `PO.key` is unnecessary for HSM access during runtime. It's required only for the initial signing of Partition Owner Authentication Certificate (POAC) and CO password resets. Store `PO.key` offline and perform the initial POAC signing on an offline machine, if possible. Customers are accountable for safeguarding their POTA private key — losing it results in the inability to recover CO passwords. Securely store the POTA private key and maintain suitable backups. See [User management in Azure Cloud HSM](user-management.md).
2828

29+
## Compliance and certification
30+
31+
Azure Cloud HSM meets multiple industry compliance standards and certifications, including FIPS 140-3 Level 3, eIDAS, and PCI/PCI 3DS. For details, see [Compliance and certification](overview.md#compliance-and-certification).
32+
2933
## Network security
3034

3135
Properly configuring your network can help prevent unauthorized access and reduce exposure to external threats.
@@ -98,3 +102,11 @@ Azure Cloud HSM provides high availability through clustered HSMs that synchroni
98102
- [Enable just-in-time access to virtual machines](/azure/defender-for-cloud/just-in-time-access-overview)
99103
- [Adopt a Zero Trust approach](/azure/security/fundamentals/network-best-practices#adopt-a-zero-trust-approach)
100104
- [Zero Trust guidance center](/security/zero-trust/zero-trust-overview)
105+
106+
## Physical security
107+
108+
Azure Cloud HSM is hosted in secure datacenters with tamper detection mechanisms. For details, see [Physical security](overview.md#physical-security).
109+
110+
## Service operations
111+
112+
Azure Cloud HSM doesn't have scheduled maintenance windows, but Microsoft notifies customers in advance of any anticipated impact. For details, see [Service operations](overview.md#service-operations).

articles/cloud-hsm/service-limits.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,18 @@ author: keithp
55
manager: davinune
66
ms.service: azure-cloud-hsm
77
ms.topic: reference
8-
ms.date: 03/20/2025
8+
ms.date: 03/31/2026
99
ms.author: keithp
1010
---
1111

1212
# Azure Cloud HSM service limits
1313

1414
This article describes service limits for the resource type `microsoft.hardwaresecuritymodules/cloudHsmClusters` in Azure Cloud HSM.
1515

16+
## Hardware specifications
17+
18+
Azure Cloud HSM uses Marvell LiquidSecurity hardware security modules. These HSMs are validated to meet FIPS 140-3 Level 3 standards. For more information about compliance certifications, see [Compliance and certification](overview.md#compliance-and-certification).
19+
1620
## Object limits
1721

1822
The following table describes the limits for the number of objects that you can create in Azure Cloud HSM. The limits are per Cloud HSM instance. Key types are Rivest-Shamir-Adleman (RSA), elliptic curve (EC), and Advanced Encryption Standard (AES).

articles/cloud-hsm/user-management.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn best practices for managing user identities, securing credent
44
author: msmbaldwin
55
ms.service: azure-cloud-hsm
66
ms.topic: best-practice
7-
ms.date: 03/20/2025
7+
ms.date: 03/31/2026
88
ms.author: mbaldwin
99

1010
#customer intent: As a security administrator, I need to manage user identities and permissions in Azure Cloud HSM so that I can ensure security and compliance.
@@ -41,6 +41,12 @@ Protecting your HSM user credentials is paramount, because these credentials gra
4141

4242
Azure Cloud HSM does not retain access to your HSM user credentials. If you lose access to your credentials, Microsoft can't help.
4343

44+
## Protect your partition owner certificate
45+
46+
The partition owner certificate (`PO.crt`) is a critical component that you upload during HSM initialization. After you upload the partition owner certificate, you can't change it. If you upload an incorrect certificate, you must delete the Azure Cloud HSM resource and deploy again.
47+
48+
Store the partition owner certificate and its corresponding private key (`PO.key`) securely. Keep the private key offline whenever possible, because it's required only for initial signing and cryptography officer (CO) password resets. For more information about the partition owner private key, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
49+
4450
## Ensure your HSM users are available on all nodes of your cluster
4551

4652
When you create a user, the user is created on all three nodes of the Cloud HSM cluster if all nodes are available. However, unlike keys, Azure Cloud HSM service does not perform backend user synchronization. User management is fully customer managed.

articles/defender-for-cloud/release-notes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,11 @@ This article summarizes what's new in Microsoft Defender for Cloud. It includes
4040
April 1, 2026
4141

4242
The service helps U.S. federal and government agencies, including the Department of Defense (DoD) and civilian agencies, secure Kubernetes workloads by providing cloud security posture management, vulnerability assessment, and runtime threat protection for containerized environments.
43+
4344
The Defender for Containers plan in Azure Government cloud now aligns with the commercial cloud offering in feature coverage, including agentless Kubernetes discovery, comprehensive inventory, attack path analysis, enhanced risk hunting, vulnerability assessment, compliance and runtime protection capabilities.
45+
4446
For more information about Microsoft Defender for Containers, see [Overview of Microsoft Defender for Containers](/azure/defender-for-cloud/defender-for-containers-introduction).
47+
4548
For more information about feature and cloud availability, see [Containers support matrix in Defender for Cloud](/azure/defender-for-cloud/support-matrix-defender-for-containers).
4649

4750
### Update to Defender for SQL servers on machines plan for Fairfax customers

0 commit comments

Comments
 (0)