You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cloud-hsm/secure-cloud-hsm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,7 +92,7 @@ Azure Cloud HSM provides high availability through clustered HSMs that synchroni
92
92
93
93
-**Verify user and key synchronization across all nodes**: Azure Cloud HSM operates as a cluster of three nodes. During service events such as self-healing or upgrades, users or keys might not be replicated to all nodes. If you experience intermittent authentication or operation failures, verify that all users and keys exist on every node. See [Synchronize users and keys across Azure Cloud HSM nodes](synchronize-users-keys.md).
94
94
95
-
## Related content
95
+
## Next steps
96
96
97
97
-[Security best practices for IaaS workloads in Azure](/azure/security/fundamentals/iaas)
98
98
-[Enable just-in-time access to virtual machines](/azure/defender-for-cloud/just-in-time-access-overview)
Copy file name to clipboardExpand all lines: articles/payment-hsm/secure-payment-hsm.md
+34-30Lines changed: 34 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,80 +5,84 @@ author: msmbaldwin
5
5
ms.author: mbaldwin
6
6
ms.service: azure-payment-hsm
7
7
ms.topic: best-practice
8
-
ms.date: 09/26/2025
8
+
ms.date: 03/31/2026
9
9
ms.custom: horz-security
10
+
ai-usage: ai-assisted
10
11
---
11
12
12
13
# Secure your Azure Payment HSM
13
14
14
15
Azure Payment HSM is a "BareMetal" service that provides cryptographic key operations for real-time, critical payment transactions in the Azure cloud using Thales payShield 10K payment hardware security modules (HSMs). Because this service protects sensitive financial cryptographic keys and operations, implementing robust security controls is essential to maintain the integrity and confidentiality of your payment infrastructure.
15
16
16
-
This article provides guidance on how to best secure your Azure Payment HSM deployment. Following these recommendations will help you maintain a strong security posture and protect your cryptographic assets.
17
+
This article provides guidance on how to best secure your Azure Payment HSM deployment. Following these recommendations helps you maintain a strong security posture and protect your cryptographic assets.
18
+
19
+
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
17
20
18
21
## Network security
19
22
20
23
Azure Payment HSM requires a properly secured network environment for its operation, especially when connecting to on-premises environments or implementing high availability scenarios.
21
24
22
-
-**Deploy HSMs in an isolated subnet with proper delegation**: Create a dedicated subnet for your HSM devices with delegation set to "Microsoft.HardwareSecurityModules/dedicatedHSMs". This provides necessary isolation and ensures proper resource provisioning. For more information, see [Create a payment HSM](create-payment-hsm.md).
25
+
-**Deploy HSMs in an isolated subnet with proper delegation**: Create a dedicated subnet for your HSM devices with delegation set to `Microsoft.HardwareSecurityModules/dedicatedHSMs`. This provides necessary isolation and ensures proper resource provisioning. For more information, see [Create a payment HSM](create-payment-hsm.md).
26
+
27
+
-**Enable the FastPathEnabled feature flag and VNet tag**: Register the `FastPathEnabled` feature flag on every subscription that needs access to Azure Payment HSM, and add the `fastpathenabled` tag to every virtual network connecting to the payment HSM's delegated subnet. Both steps must be completed before resources can connect to HSM devices. For more information, see [Fastpathenabled](fastpathenabled.md).
23
28
24
-
-**Implement traffic inspection with appropriate architecture**: Since Network Security Groups (NSGs) and User-Defined Routes (UDRs) aren't supported on payment HSM subnets, consider implementing a firewall with source network address translation (SNAT) or a reverse proxy to inspect traffic. This enables you to monitor and filter traffic to your HSM devices. For more information, see [Azure Payment HSM traffic inspection](inspect-traffic.md).
29
+
-**Implement traffic inspection with appropriate architecture**: Network Security Groups (NSGs) and User-Defined Routes (UDRs) aren't supported on payment HSM subnets. To inspect and filter traffic to your HSM devices, implement a firewall with source network address translation (SNAT) or a reverse proxy. For more information, see [Azure Payment HSM traffic inspection](inspect-traffic.md).
25
30
26
-
-**Implement secure connectivity to on-premises resources**: Use Site-to-Site VPN or ExpressRoute to create secure connections between your on-premises environment and Azure-based HSMs. This enables secure management and operations while protecting sensitive traffic. For more information, see [Solution design for Azure Payment HSM](solution-design.md).
31
+
-**Implement secure connectivity to on-premises resources**: Use Site-to-Site VPN or ExpressRoute to create secure connections between your on-premises environment and Azure-based HSMs. Virtual network peering doesn't support cross-region communication with payment HSM instances without the use of ExpressRoute or a VPN gateway. For more information, see [Solution design for Azure Payment HSM](solution-design.md).
27
32
28
-
## Identity management
33
+
## Identity and access management
29
34
30
35
Proper identity and access management is crucial for securing your HSM devices, which store and process your most sensitive cryptographic keys.
31
36
32
37
-**Secure your administrative cards and readers**: Protect the smart cards and readers required for HSM administration. A minimum of five smart cards (three cards for a CTA set, a Left Key Card, and a Right Key Card) and one reader are needed. Follow Thales's payShield 10K Installation and User Guide for detailed instructions. For more information, see [Access the payShield manager](access-payshield-manager.md).
33
38
34
-
-**Change default passwords immediately after provisioning**: When you first access a newly provisioned HSM device, change any default credentials to strong, complex passwords. Store these passwords securely following your organization's credential management policies.
35
-
36
-
-**Implement strong authentication for HSM access**: Configure the HSM to use strong authentication mechanisms for all accounts. Be aware of the different thresholds for login attempts to avoid accidental zeroization of your HSM.
37
-
38
-
-**Carefully manage key component distribution**: When keys need to be distributed to third parties in the form of key components, use a Trusted Management Device (TMD) or similar solution to export keys securely from your customer's location. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#key-management--customer-scenarios).
39
+
-**Change default passwords immediately after provisioning**: When you first access a newly provisioned HSM device, change any default credentials to strong, complex passwords. Store these passwords securely following your organization's credential management policies. For more information, see [Access the payShield manager](access-payshield-manager.md).
39
40
40
-
## Privileged access
41
+
-**Apply the least privilege principle to HSM roles**: Assign the minimum necessary permissions to users through Thales payShield's role-based system. Use separate accounts for different administrative tasks and cryptographic operations as needed. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md).
41
42
42
-
Controlling privileged access to HSM devices is essential for maintaining the securityof your cryptographic operations and sensitive key material.
43
+
-**Understand HSM management responsibilities**: Microsoft handles physical security of the HSM while customers are responsible for the logical security, configuration, and maintenance of allocated HSMs. Microsoft doesn't maintain console-access once an HSM is allocated. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md).
43
44
44
-
-**Apply least privilege principle to HSM roles**: Assign the minimum necessary permissions to users through Thales payShield's role-based system. Use separate accounts for different administrative tasks and cryptographic operations as needed.
45
-
46
-
-**Be aware of HSM management responsibilities**: Understand that Microsoft handles physical security of the HSM while customers are responsible for the logical security, configuration, and maintenance of allocated HSMs. Microsoft does not maintain console-access once an HSM is allocated. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md).
45
+
-**Carefully manage key component distribution**: When keys need to be distributed to third parties in the form of key components, use a Trusted Management Device (TMD) or similar solution to export keys securely from your customer's location. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#key-management--customer-scenarios).
47
46
48
-
## Backup and Recovery
47
+
## Data protection
49
48
50
-
Implementing proper backup and recovery mechanisms is crucial for maintaining service availability and protecting against data loss.
49
+
Protecting the cryptographic keys and sensitive data stored in your HSM is the primary purpose of using Azure Payment HSM.
51
50
52
-
-**Design proper high availability to maintain resiliency**: Implement high availability by provisioning HSMs across different stamps in the same region, and deploy additional HSMs in alternate regions for disaster recovery. This ensures continuous availability of your payment infrastructure. For more information, see [Deployment scenarios](deployment-scenarios.md).
51
+
-**Ensure proper commissioning and LMK generation**: Follow Thales's payShield 10K Installation and User Guide for HSM commissioning, HSM configuration, and loading Local Master Keys (LMKs). For more information, see [Access the payShield manager](access-payshield-manager.md).
53
52
54
-
-**Implement key backup procedures**: Regularly backup your cryptographic keys using approved methods. Since Payment HSMs operate in a stateless server model, proper key backup is essential to prevent data loss. For more information, see [FAQ](faq.yml) and [Lifecycle Management](lifecycle-management.md).
53
+
-**Apply firmware updates regularly**: Microsoft allocates Payment HSMs with a base image that includes approved firmware. You're responsible for applying security patches and firmware updates to allocated HSMs. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-firmware-management).
55
54
56
-
-**Test recovery procedures regularly**: Periodically test your recovery procedures to ensure they work properly when needed. Document these procedures and keep them updated as your environment changes.
55
+
-**Properly decommission HSMs when no longer needed**: When decommissioning an HSM, release the device through the payShield Manager before deleting it in Azure. For firmware versions earlier than 2.1a (1.15.0), also use the `SV` command to view loaded certificates and the `SD` command to delete any remaining certificate data before releasing the device. This ensures all customer content and secrets are removed before the HSM is returned to Microsoft. For more information, see [Remove a commissioned payment HSM](remove-payment-hsm.md) and [Known issues](known-issues.md#tls-certificates-arent-removed-during-hsm-release).
57
56
58
57
## Logging and monitoring
59
58
60
59
Comprehensive logging and monitoring are essential for maintaining visibility into HSM operations, detecting potential security incidents, and ensuring compliance.
61
60
62
-
-**Monitor HSM operational health**: Take responsibility for monitoring your allocated HSM's operational health, including HSM error logs and audit logs. You can utilize all payShield monitoring solutions. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-monitoring).
61
+
-**Monitor HSM operational health**: Take responsibility for monitoring your allocated HSM's operational health, including HSM error logs and audit logs. You can use all payShield monitoring solutions. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-monitoring).
63
62
64
-
-**Implement SNMP monitoring**: Configure Simple Network Management Protocol (SNMP) to monitor the health and status of your HSM devices. This allows you to proactively detect hardware issues before they impact operations. For more information, see [Getting started with Azure Payment HSM](getting-started.md).
63
+
-**Implement real-time log replication and backup**: Back up your HSM audit and error logs regularly. Implement real-time log replication to ensure that log data is preserved and available for incident investigation and compliance auditing. For more information, see [Azure Payment HSM service support guide](support-guide.md).
64
+
65
+
-**Implement SNMP monitoring**: Configure Simple Network Management Protocol (SNMP) to monitor the health and status of your HSM devices. This allows you to proactively detect hardware issues before they affect operations. For more information, see [Getting started with Azure Payment HSM](getting-started.md).
65
66
66
67
-**Consider using payShield Monitor**: For continuous monitoring of HSMs, consider using payShield Monitor, which is available for licensing from Thales. For more information, see [Getting started with Azure Payment HSM](getting-started.md).
67
68
68
-
-**Set up alerts for critical events**: Configure alerting based on critical log events, such as failed login attempts, configuration changes, or hardware issues. This enables prompt response to potential security incidents.
69
+
## Compliance and governance
69
70
70
-
## Data protection
71
+
Azure Payment HSM meets stringent compliance standards for payment security. Understanding the certification landscape helps you maintain audit compliance for your payment infrastructure.
71
72
72
-
Protecting the cryptographic keys and sensitive data stored in your HSM is the primary purpose of using Azure Payment HSM.
73
+
-**Use Azure Payment HSM to simplify PCI compliance**: Azure Payment HSM can be deployed as part of a validated PCI P2PE or PCI PIN component or solution, helping to simplify ongoing security audit compliance. Microsoft maintains PCI DSS, PCI PIN, and PCI 3DS compliant Azure data centers, including those that house Azure Payment HSM solutions. For more information, see [Certification and compliance](certification-compliance.md).
73
74
74
-
-**Ensure proper commissioning and LMK generation**: Follow Thales's payShield 10K Installation and User Guide for HSM commissioning, HSM configuration, and loading Local Master Keys (LMKs). For more information, see [Access the payShield manager](access-payshield-manager.md).
75
+
-**Verify HSM device certifications**: Thales payShield 10K HSMs deployed in the security infrastructure are certified to FIPS 140-2 Level 3 and PCI HSM v3. The service also meets ISO 27001, SOC 1/2/3, and other compliance standards. For more information, see [Certification and compliance](certification-compliance.md).
75
76
76
-
-**Apply firmware updates regularly**: Microsoft allocates Payment HSMs with a base image that includes approved firmware. You are responsible for applying security patches and firmware updates to allocated HSMs. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-firmware-management).
77
+
## Backup and recovery
78
+
79
+
Implementing proper backup and recovery mechanisms is crucial for maintaining service availability and protecting against data loss.
77
80
78
-
-**Properly decommission HSMs when no longer needed**: When decommissioning an HSM, ensure you properly release the device through the payShield Manager before deleting it in Azure. This ensures all customer content/secrets are removed before it is returned to Microsoft. For more information, see [Remove a commissioned payment HSM](remove-payment-hsm.md).
81
+
-**Design proper high availability to maintain resiliency**: Implement high availability by provisioning HSMs across different stamps in the same region, and deploy additional HSMs in alternate regions for disaster recovery. Without a high availability setup in your production environment, you can't receive Severity A support from Microsoft. For more information, see [Deployment scenarios](deployment-scenarios.md).
79
82
80
-
-**Understand that zeroization occurs automatically**: When deallocating HSMs from customers, all encryption material is erased from the device as part of the mechanism that re-enables Microsoft's administrative access. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#security-and-compliance).
83
+
-**Implement key backup procedures**: Regularly back up your cryptographic keys using approved methods. Since Payment HSMs operate in a stateless server model, proper key backup is essential to prevent data loss. For more information, see [FAQ](faq.yml) and [Lifecycle Management](lifecycle-management.md).
81
84
85
+
-**Test recovery procedures regularly**: Periodically test your recovery procedures to ensure they work properly when needed. Document these procedures and keep them updated as your environment changes. For more information, see [Deployment scenarios](deployment-scenarios.md).
0 commit comments