Skip to content

Commit 5d025b4

Browse files
msmbaldwinCopilot
andcommitted
Audit and fix Payment HSM security article
- Add Zero Trust include banner - Reorder sections to standard template (Network, Identity, Data protection, Logging, Compliance, Backup) - Add new Compliance and governance section with PCI/FIPS/ISO guidance - Merge Privileged access into Identity and access management - Add FastPathEnabled networking requirement - Add real-time log replication and backup recommendation - Add TLS certificate cleanup detail to decommissioning guidance - Add HA/Severity A support eligibility warning - Remove non-actionable and unsupported generic recommendations - Add missing links to recommendations - Add ai-usage metadata, update ms.date - Fix 'Related content' to 'Next steps' in Payment HSM and Cloud HSM articles Co-authored-by: Copilot <[email protected]>
1 parent 43379fa commit 5d025b4

2 files changed

Lines changed: 35 additions & 31 deletions

File tree

articles/cloud-hsm/secure-cloud-hsm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ Azure Cloud HSM provides high availability through clustered HSMs that synchroni
9292

9393
- **Verify user and key synchronization across all nodes**: Azure Cloud HSM operates as a cluster of three nodes. During service events such as self-healing or upgrades, users or keys might not be replicated to all nodes. If you experience intermittent authentication or operation failures, verify that all users and keys exist on every node. See [Synchronize users and keys across Azure Cloud HSM nodes](synchronize-users-keys.md).
9494

95-
## Related content
95+
## Next steps
9696

9797
- [Security best practices for IaaS workloads in Azure](/azure/security/fundamentals/iaas)
9898
- [Enable just-in-time access to virtual machines](/azure/defender-for-cloud/just-in-time-access-overview)

articles/payment-hsm/secure-payment-hsm.md

Lines changed: 34 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -5,80 +5,84 @@ author: msmbaldwin
55
ms.author: mbaldwin
66
ms.service: azure-payment-hsm
77
ms.topic: best-practice
8-
ms.date: 09/26/2025
8+
ms.date: 03/31/2026
99
ms.custom: horz-security
10+
ai-usage: ai-assisted
1011
---
1112

1213
# Secure your Azure Payment HSM
1314

1415
Azure Payment HSM is a "BareMetal" service that provides cryptographic key operations for real-time, critical payment transactions in the Azure cloud using Thales payShield 10K payment hardware security modules (HSMs). Because this service protects sensitive financial cryptographic keys and operations, implementing robust security controls is essential to maintain the integrity and confidentiality of your payment infrastructure.
1516

16-
This article provides guidance on how to best secure your Azure Payment HSM deployment. Following these recommendations will help you maintain a strong security posture and protect your cryptographic assets.
17+
This article provides guidance on how to best secure your Azure Payment HSM deployment. Following these recommendations helps you maintain a strong security posture and protect your cryptographic assets.
18+
19+
[!INCLUDE [Security horizontal Zero Trust statement](~/reusable-content/ce-skilling/azure/includes/security/zero-trust-security-horizontal.md)]
1720

1821
## Network security
1922

2023
Azure Payment HSM requires a properly secured network environment for its operation, especially when connecting to on-premises environments or implementing high availability scenarios.
2124

22-
- **Deploy HSMs in an isolated subnet with proper delegation**: Create a dedicated subnet for your HSM devices with delegation set to "Microsoft.HardwareSecurityModules/dedicatedHSMs". This provides necessary isolation and ensures proper resource provisioning. For more information, see [Create a payment HSM](create-payment-hsm.md).
25+
- **Deploy HSMs in an isolated subnet with proper delegation**: Create a dedicated subnet for your HSM devices with delegation set to `Microsoft.HardwareSecurityModules/dedicatedHSMs`. This provides necessary isolation and ensures proper resource provisioning. For more information, see [Create a payment HSM](create-payment-hsm.md).
26+
27+
- **Enable the FastPathEnabled feature flag and VNet tag**: Register the `FastPathEnabled` feature flag on every subscription that needs access to Azure Payment HSM, and add the `fastpathenabled` tag to every virtual network connecting to the payment HSM's delegated subnet. Both steps must be completed before resources can connect to HSM devices. For more information, see [Fastpathenabled](fastpathenabled.md).
2328

24-
- **Implement traffic inspection with appropriate architecture**: Since Network Security Groups (NSGs) and User-Defined Routes (UDRs) aren't supported on payment HSM subnets, consider implementing a firewall with source network address translation (SNAT) or a reverse proxy to inspect traffic. This enables you to monitor and filter traffic to your HSM devices. For more information, see [Azure Payment HSM traffic inspection](inspect-traffic.md).
29+
- **Implement traffic inspection with appropriate architecture**: Network Security Groups (NSGs) and User-Defined Routes (UDRs) aren't supported on payment HSM subnets. To inspect and filter traffic to your HSM devices, implement a firewall with source network address translation (SNAT) or a reverse proxy. For more information, see [Azure Payment HSM traffic inspection](inspect-traffic.md).
2530

26-
- **Implement secure connectivity to on-premises resources**: Use Site-to-Site VPN or ExpressRoute to create secure connections between your on-premises environment and Azure-based HSMs. This enables secure management and operations while protecting sensitive traffic. For more information, see [Solution design for Azure Payment HSM](solution-design.md).
31+
- **Implement secure connectivity to on-premises resources**: Use Site-to-Site VPN or ExpressRoute to create secure connections between your on-premises environment and Azure-based HSMs. Virtual network peering doesn't support cross-region communication with payment HSM instances without the use of ExpressRoute or a VPN gateway. For more information, see [Solution design for Azure Payment HSM](solution-design.md).
2732

28-
## Identity management
33+
## Identity and access management
2934

3035
Proper identity and access management is crucial for securing your HSM devices, which store and process your most sensitive cryptographic keys.
3136

3237
- **Secure your administrative cards and readers**: Protect the smart cards and readers required for HSM administration. A minimum of five smart cards (three cards for a CTA set, a Left Key Card, and a Right Key Card) and one reader are needed. Follow Thales's payShield 10K Installation and User Guide for detailed instructions. For more information, see [Access the payShield manager](access-payshield-manager.md).
3338

34-
- **Change default passwords immediately after provisioning**: When you first access a newly provisioned HSM device, change any default credentials to strong, complex passwords. Store these passwords securely following your organization's credential management policies.
35-
36-
- **Implement strong authentication for HSM access**: Configure the HSM to use strong authentication mechanisms for all accounts. Be aware of the different thresholds for login attempts to avoid accidental zeroization of your HSM.
37-
38-
- **Carefully manage key component distribution**: When keys need to be distributed to third parties in the form of key components, use a Trusted Management Device (TMD) or similar solution to export keys securely from your customer's location. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#key-management--customer-scenarios).
39+
- **Change default passwords immediately after provisioning**: When you first access a newly provisioned HSM device, change any default credentials to strong, complex passwords. Store these passwords securely following your organization's credential management policies. For more information, see [Access the payShield manager](access-payshield-manager.md).
3940

40-
## Privileged access
41+
- **Apply the least privilege principle to HSM roles**: Assign the minimum necessary permissions to users through Thales payShield's role-based system. Use separate accounts for different administrative tasks and cryptographic operations as needed. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md).
4142

42-
Controlling privileged access to HSM devices is essential for maintaining the security of your cryptographic operations and sensitive key material.
43+
- **Understand HSM management responsibilities**: Microsoft handles physical security of the HSM while customers are responsible for the logical security, configuration, and maintenance of allocated HSMs. Microsoft doesn't maintain console-access once an HSM is allocated. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md).
4344

44-
- **Apply least privilege principle to HSM roles**: Assign the minimum necessary permissions to users through Thales payShield's role-based system. Use separate accounts for different administrative tasks and cryptographic operations as needed.
45-
46-
- **Be aware of HSM management responsibilities**: Understand that Microsoft handles physical security of the HSM while customers are responsible for the logical security, configuration, and maintenance of allocated HSMs. Microsoft does not maintain console-access once an HSM is allocated. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md).
45+
- **Carefully manage key component distribution**: When keys need to be distributed to third parties in the form of key components, use a Trusted Management Device (TMD) or similar solution to export keys securely from your customer's location. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#key-management--customer-scenarios).
4746

48-
## Backup and Recovery
47+
## Data protection
4948

50-
Implementing proper backup and recovery mechanisms is crucial for maintaining service availability and protecting against data loss.
49+
Protecting the cryptographic keys and sensitive data stored in your HSM is the primary purpose of using Azure Payment HSM.
5150

52-
- **Design proper high availability to maintain resiliency**: Implement high availability by provisioning HSMs across different stamps in the same region, and deploy additional HSMs in alternate regions for disaster recovery. This ensures continuous availability of your payment infrastructure. For more information, see [Deployment scenarios](deployment-scenarios.md).
51+
- **Ensure proper commissioning and LMK generation**: Follow Thales's payShield 10K Installation and User Guide for HSM commissioning, HSM configuration, and loading Local Master Keys (LMKs). For more information, see [Access the payShield manager](access-payshield-manager.md).
5352

54-
- **Implement key backup procedures**: Regularly backup your cryptographic keys using approved methods. Since Payment HSMs operate in a stateless server model, proper key backup is essential to prevent data loss. For more information, see [FAQ](faq.yml) and [Lifecycle Management](lifecycle-management.md).
53+
- **Apply firmware updates regularly**: Microsoft allocates Payment HSMs with a base image that includes approved firmware. You're responsible for applying security patches and firmware updates to allocated HSMs. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-firmware-management).
5554

56-
- **Test recovery procedures regularly**: Periodically test your recovery procedures to ensure they work properly when needed. Document these procedures and keep them updated as your environment changes.
55+
- **Properly decommission HSMs when no longer needed**: When decommissioning an HSM, release the device through the payShield Manager before deleting it in Azure. For firmware versions earlier than 2.1a (1.15.0), also use the `SV` command to view loaded certificates and the `SD` command to delete any remaining certificate data before releasing the device. This ensures all customer content and secrets are removed before the HSM is returned to Microsoft. For more information, see [Remove a commissioned payment HSM](remove-payment-hsm.md) and [Known issues](known-issues.md#tls-certificates-arent-removed-during-hsm-release).
5756

5857
## Logging and monitoring
5958

6059
Comprehensive logging and monitoring are essential for maintaining visibility into HSM operations, detecting potential security incidents, and ensuring compliance.
6160

62-
- **Monitor HSM operational health**: Take responsibility for monitoring your allocated HSM's operational health, including HSM error logs and audit logs. You can utilize all payShield monitoring solutions. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-monitoring).
61+
- **Monitor HSM operational health**: Take responsibility for monitoring your allocated HSM's operational health, including HSM error logs and audit logs. You can use all payShield monitoring solutions. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-monitoring).
6362

64-
- **Implement SNMP monitoring**: Configure Simple Network Management Protocol (SNMP) to monitor the health and status of your HSM devices. This allows you to proactively detect hardware issues before they impact operations. For more information, see [Getting started with Azure Payment HSM](getting-started.md).
63+
- **Implement real-time log replication and backup**: Back up your HSM audit and error logs regularly. Implement real-time log replication to ensure that log data is preserved and available for incident investigation and compliance auditing. For more information, see [Azure Payment HSM service support guide](support-guide.md).
64+
65+
- **Implement SNMP monitoring**: Configure Simple Network Management Protocol (SNMP) to monitor the health and status of your HSM devices. This allows you to proactively detect hardware issues before they affect operations. For more information, see [Getting started with Azure Payment HSM](getting-started.md).
6566

6667
- **Consider using payShield Monitor**: For continuous monitoring of HSMs, consider using payShield Monitor, which is available for licensing from Thales. For more information, see [Getting started with Azure Payment HSM](getting-started.md).
6768

68-
- **Set up alerts for critical events**: Configure alerting based on critical log events, such as failed login attempts, configuration changes, or hardware issues. This enables prompt response to potential security incidents.
69+
## Compliance and governance
6970

70-
## Data protection
71+
Azure Payment HSM meets stringent compliance standards for payment security. Understanding the certification landscape helps you maintain audit compliance for your payment infrastructure.
7172

72-
Protecting the cryptographic keys and sensitive data stored in your HSM is the primary purpose of using Azure Payment HSM.
73+
- **Use Azure Payment HSM to simplify PCI compliance**: Azure Payment HSM can be deployed as part of a validated PCI P2PE or PCI PIN component or solution, helping to simplify ongoing security audit compliance. Microsoft maintains PCI DSS, PCI PIN, and PCI 3DS compliant Azure data centers, including those that house Azure Payment HSM solutions. For more information, see [Certification and compliance](certification-compliance.md).
7374

74-
- **Ensure proper commissioning and LMK generation**: Follow Thales's payShield 10K Installation and User Guide for HSM commissioning, HSM configuration, and loading Local Master Keys (LMKs). For more information, see [Access the payShield manager](access-payshield-manager.md).
75+
- **Verify HSM device certifications**: Thales payShield 10K HSMs deployed in the security infrastructure are certified to FIPS 140-2 Level 3 and PCI HSM v3. The service also meets ISO 27001, SOC 1/2/3, and other compliance standards. For more information, see [Certification and compliance](certification-compliance.md).
7576

76-
- **Apply firmware updates regularly**: Microsoft allocates Payment HSMs with a base image that includes approved firmware. You are responsible for applying security patches and firmware updates to allocated HSMs. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#hsm-firmware-management).
77+
## Backup and recovery
78+
79+
Implementing proper backup and recovery mechanisms is crucial for maintaining service availability and protecting against data loss.
7780

78-
- **Properly decommission HSMs when no longer needed**: When decommissioning an HSM, ensure you properly release the device through the payShield Manager before deleting it in Azure. This ensures all customer content/secrets are removed before it is returned to Microsoft. For more information, see [Remove a commissioned payment HSM](remove-payment-hsm.md).
81+
- **Design proper high availability to maintain resiliency**: Implement high availability by provisioning HSMs across different stamps in the same region, and deploy additional HSMs in alternate regions for disaster recovery. Without a high availability setup in your production environment, you can't receive Severity A support from Microsoft. For more information, see [Deployment scenarios](deployment-scenarios.md).
7982

80-
- **Understand that zeroization occurs automatically**: When deallocating HSMs from customers, all encryption material is erased from the device as part of the mechanism that re-enables Microsoft's administrative access. For more information, see [Azure Payment HSM Lifecycle Management](lifecycle-management.md#security-and-compliance).
83+
- **Implement key backup procedures**: Regularly back up your cryptographic keys using approved methods. Since Payment HSMs operate in a stateless server model, proper key backup is essential to prevent data loss. For more information, see [FAQ](faq.yml) and [Lifecycle Management](lifecycle-management.md).
8184

85+
- **Test recovery procedures regularly**: Periodically test your recovery procedures to ensure they work properly when needed. Document these procedures and keep them updated as your environment changes. For more information, see [Deployment scenarios](deployment-scenarios.md).
8286

8387
## Next steps
8488

0 commit comments

Comments
 (0)