You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cloud-hsm/authentication.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about various authentication methods and best practices for s
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
6
ms.topic: feature-guide
7
-
ms.date: 03/20/2025
7
+
ms.date: 03/31/2026
8
8
ms.author: mbaldwin
9
9
#customer intent: As a Cloud HSM administrator, I want to learn how to secure and optimize my Cloud HSM deployment so that I can ensure the highest level of security and performance.
10
10
---
@@ -13,6 +13,10 @@ ms.author: mbaldwin
13
13
14
14
Authentication is a crucial aspect of securely accessing and operating within Azure Cloud HSM. This article outlines authentication methods, including command-line interface (CLI), PKCS#11, Java Cryptography Extension (JCE), and OpenSSL. This article also provides best practices for multithreading and session handling.
15
15
16
+
## Supported authentication methods
17
+
18
+
Azure Cloud HSM supports only password-based authentication. It doesn't support authentication through a PIN entry device (PED).
19
+
16
20
## Cloud HSM CLI authentication
17
21
18
22
You can authenticate by using CLI tools like `azcloudhsm_util` in either interactive mode or single-command mode. In interactive mode, use the `loginHSM` command. For single-command mode, include `singlecmd` and parameters for `loginHSM`. We advise you to securely store your HSM credentials when your application isn't using them.
Copy file name to clipboardExpand all lines: articles/cloud-hsm/faq.yml
+12-10Lines changed: 12 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ metadata:
5
5
author: msmbaldwin
6
6
ms.service: azure-cloud-hsm
7
7
ms.topic: faq
8
-
ms.date: 03/20/2025
8
+
ms.date: 03/31/2026
9
9
ms.author: mbaldwin
10
10
title: FAQ about Azure Cloud HSM
11
11
summary: Find answers to common questions about Microsoft Azure Cloud HSM.
@@ -27,7 +27,7 @@ sections:
27
27
- question: |-
28
28
What hardware is used for Azure Cloud HSM?
29
29
answer: |-
30
-
Azure Cloud HSM uses Marvell LiquidSecurity hardware security modules. For more information about service specifications, see [Azure Cloud HSM service limits](service-limits.md).
30
+
Azure Cloud HSM uses Marvell LiquidSecurity hardware security modules. For more information about hardware specifications and service limits, see [Azure Cloud HSM service limits](service-limits.md).
31
31
- question: |-
32
32
What software is provided with Azure Cloud HSM?
33
33
answer: |-
@@ -137,7 +137,7 @@ sections:
137
137
- question: |-
138
138
Can I update the partition owner certificate after I upload it?
139
139
answer: |-
140
-
No. You can't change the partition owner certificate after you upload it. If you upload `PO.crt` in error, you need to delete your Azure Cloud HSM resource and deploy again.
140
+
No. For details about partition owner certificate management, see [User management in Azure Cloud HSM](user-management.md#protect-your-partition-owner-certificate).
141
141
142
142
- name: Business continuity
143
143
questions:
@@ -185,17 +185,19 @@ sections:
185
185
- question: |-
186
186
Does Azure Cloud HSM support FIPS 140-3 Level 3?
187
187
answer: |-
188
-
Yes, Azure Cloud HSM offers HSMs that are validated to meet the FIPS 140-3 Level 3 standards. For procedures to verify the authenticity of your HSM, including checking the [FIPS 140-3 Level 3 certification from NIST](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4700), refer to the [onboarding guide](onboarding-guide.md). For more information about compliance, see [What is Azure Cloud HSM?](overview.md).
188
+
Yes. For details, see [Compliance and certification](overview.md#compliance-and-certification).
189
189
- question: |-
190
190
Does Azure Cloud HSM support eIDAS?
191
191
answer: |-
192
-
Yes. Azure Cloud HSM supports eIDAS compliance under the Austrian scheme by providing secure key management, cryptographic operations, and FIPS 140-3 Level 3 validated hardware to meet stringent requirements for qualified electronic signatures and seals, to help ensure regulatory compliance. Learn more in the [QSCD Certificate](https://www.a-sit.at/wp-content/uploads/2024/10/VIG-19-078-QSCD-Certificate-Final_sig-HL.pdf). For more information about security standards, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
192
+
Yes. For details, see [Compliance and certification](overview.md#compliance-and-certification).
193
+
- question: |-
194
+
Does Azure Cloud HSM support PCI?
195
+
answer: |-
196
+
Yes. For details, see [Compliance and certification](overview.md#compliance-and-certification).
193
197
- question: |-
194
198
What happens if someone tampers with the HSM hardware?
195
199
answer: |-
196
-
Azure Cloud HSM incorporates both physical and logical tamper detection and response mechanisms that initiate key deletion (zeroization) of the hardware. These measures are designed to detect tampering if the physical barrier is compromised.
197
-
198
-
Additionally, HSMs are safeguarded against brute-force sign-in attacks. The system locks out cryptography officers (COs) after a set number of unsuccessful access attempts. Similarly, repeated unsuccessful attempts to access an HSM with cryptography user (CU) credentials result in locking out the user. A CO must then unlock the CU. Unlocking a CO requires `getChallenge` and signing the challenge with `PO.key` via OpenSSL, followed by `unlockCO` and `changePswd` commands. For more information about security features, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
200
+
Azure Cloud HSM incorporates tamper detection and response mechanisms. For details, see [Physical security](overview.md#physical-security).
199
201
200
202
- name: Support
201
203
questions:
@@ -206,15 +208,15 @@ sections:
206
208
- question: |-
207
209
How are the HSMs used in Azure Cloud HSM protected?
208
210
answer: |-
209
-
Azure datacenters have extensive physical and procedural security controls. Additionally, the HSMs in Azure Cloud HSM are hosted in a restricted access area of the datacenter, with physical access controls and video surveillance for added security. For more information about physical security, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
211
+
Azure datacenters have extensive physical and procedural security controls. For details, see [Physical security](overview.md#physical-security).
210
212
- question: |-
211
213
Can Microsoft recover my keys if I lose the credentials to my HSM?
212
214
answer: |-
213
215
No. Microsoft doesn't have access to your keys or credentials and can't recover your keys if you lose your credentials. For more information about credential management, see [User management in Azure Cloud HSM](user-management.md).
214
216
- question: |-
215
217
Does Azure Cloud HSM have scheduled maintenance windows?
216
218
answer: |-
217
-
No, although Microsoft might need to perform maintenance for necessary upgrades or faulty hardware. We notify customers in advance if we anticipate any impact. For more information about operational considerations, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
219
+
No. For details, see [Service operations](overview.md#service-operations).
Copy file name to clipboardExpand all lines: articles/cloud-hsm/overview.md
+27-3Lines changed: 27 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how Azure Cloud HSM offers cryptographic key storage within t
4
4
author: keithp
5
5
ms.service: azure-cloud-hsm
6
6
ms.topic: overview
7
-
ms.date: 03/20/2025
7
+
ms.date: 03/31/2026
8
8
ms.author: keithp
9
9
10
10
#customer intent: As an IT pro decision-maker, I'm looking for key storage capability within the Azure cloud platform that meets FIPS 140-3 Level 3 certification and that gives me exclusive access to a dedicated hardware security module.
@@ -42,9 +42,21 @@ The Azure Cloud HSM cluster supports load balancing of cryptographic operations.
42
42
43
43
Each Azure Cloud HSM instance is dedicated to a single customer. Each HSM cluster uses a separate customer-specific security domain that cryptographically isolates it.
44
44
45
-
### FIPS 140-3 Level 3 compliance
45
+
##Compliance and certification
46
46
47
-
Many organizations have stringent industry regulations that dictate that cryptographic keys must be stored in [FIPS 140-3 Level 3](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4700) validated HSMs. Azure Cloud HSM helps customers from various industry segments (financial services industry, government agencies, and others) meet these FIPS requirements.
47
+
Azure Cloud HSM meets multiple industry compliance standards and certifications to help customers satisfy regulatory requirements.
48
+
49
+
### FIPS 140-3 Level 3
50
+
51
+
Many organizations have stringent industry regulations that dictate that cryptographic keys must be stored in FIPS 140-3 Level 3 validated HSMs. Azure Cloud HSM offers HSMs that are validated to meet FIPS 140-3 Level 3 standards. For procedures to verify the authenticity of your HSM, including checking the [FIPS 140-3 Level 3 certification from NIST](https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4700), refer to the [onboarding guide](onboarding-guide.md). Azure Cloud HSM helps customers from various industry segments (financial services industry, government agencies, and others) meet these FIPS requirements.
52
+
53
+
### eIDAS
54
+
55
+
Azure Cloud HSM supports eIDAS compliance under the Austrian scheme by providing secure key management, cryptographic operations, and FIPS 140-3 Level 3 validated hardware to meet stringent requirements for qualified electronic signatures and seals to help ensure regulatory compliance. Learn more in the [QSCD Certificate](https://www.a-sit.at/wp-content/uploads/2024/10/VIG-19-078-QSCD-Certificate-Final_sig-HL.pdf).
56
+
57
+
### PCI and PCI 3DS
58
+
59
+
Azure Cloud HSM provides HSMs that are validated to meet PCI and PCI 3DS standards. For more details on PCI compliance certification for Azure Cloud HSM, refer to the [PCI 3DS Attestation of Compliance (AOC)](https://servicetrust.microsoft.com/DocumentPage/c88a84bd-bb48-4fe0-b93f-b4cfb7c20ba2) in Microsoft Service Trust Center.
48
60
49
61
## Azure Cloud HSM suitability
50
62
@@ -78,6 +90,18 @@ Azure Cloud HSM doesn't integrate with other platform as a service (PaaS) or sof
78
90
79
91
Azure Cloud HSM is not a good fit for Microsoft cloud services that require support for encryption with customer-managed keys. These services include Azure Information Protection, Azure Disk Encryption, Azure Data Lake Storage, Azure Storage, and Microsoft Purview Customer Key. For those scenarios, customers should use [Azure Key Vault Managed HSM](../key-vault/managed-hsm/overview.md).
80
92
93
+
## Physical security
94
+
95
+
Azure datacenters have extensive physical and procedural security controls. The HSMs in Azure Cloud HSM are hosted in a restricted access area of the datacenter, with physical access controls and video surveillance for added security.
96
+
97
+
Azure Cloud HSM incorporates both physical and logical tamper detection and response mechanisms that initiate key deletion (zeroization) of the hardware. These measures are designed to detect tampering if the physical barrier is compromised.
98
+
99
+
HSMs are safeguarded against brute-force sign-in attacks. The system locks out cryptography officers (COs) after a set number of unsuccessful access attempts. Similarly, repeated unsuccessful attempts to access an HSM with cryptography user (CU) credentials result in locking out the user. A CO must then unlock the CU. Unlocking a CO requires the `getChallenge` command, signing the challenge with the partition owner key (`PO.key`) via OpenSSL, followed by the `unlockCO` and `changePswd` commands.
100
+
101
+
## Service operations
102
+
103
+
Azure Cloud HSM doesn't have scheduled maintenance windows. However, Microsoft might need to perform maintenance for necessary upgrades or faulty hardware replacement. Customers are notified in advance if any impact is anticipated.
104
+
81
105
## Next steps
82
106
83
107
These resources are available to help you facilitate the provisioning and configuration of HSMs into your existing virtual network environment:
Copy file name to clipboardExpand all lines: articles/cloud-hsm/secure-cloud-hsm.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,10 @@ Azure Cloud HSM is a single-tenant, FIPS 140-3 Level 3 validated service that gr
26
26
27
27
-**Restrict access to the Partition Owner private key**: Limit access to the Partition Owner of the Application Partition (POTA) private key (`PO.key`). The Admin of the Application Partition (AOTA) and POTA private keys are equivalent to root access and can reset passwords for cryptography officer (CO) users in a partition (AOTA for partition 0, POTA for user partitions). `PO.key` is unnecessary for HSM access during runtime. It's required only for the initial signing of Partition Owner Authentication Certificate (POAC) and CO password resets. Store `PO.key` offline and perform the initial POAC signing on an offline machine, if possible. Customers are accountable for safeguarding their POTA private key — losing it results in the inability to recover CO passwords. Securely store the POTA private key and maintain suitable backups. See [User management in Azure Cloud HSM](user-management.md).
28
28
29
+
## Compliance and certification
30
+
31
+
Azure Cloud HSM meets multiple industry compliance standards and certifications, including FIPS 140-3 Level 3, eIDAS, and PCI/PCI 3DS. For details, see [Compliance and certification](overview.md#compliance-and-certification).
32
+
29
33
## Network security
30
34
31
35
Properly configuring your network can help prevent unauthorized access and reduce exposure to external threats.
@@ -98,3 +102,11 @@ Azure Cloud HSM provides high availability through clustered HSMs that synchroni
98
102
-[Enable just-in-time access to virtual machines](/azure/defender-for-cloud/just-in-time-access-overview)
99
103
-[Adopt a Zero Trust approach](/azure/security/fundamentals/network-best-practices#adopt-a-zero-trust-approach)
Azure Cloud HSM is hosted in secure datacenters with tamper detection mechanisms. For details, see [Physical security](overview.md#physical-security).
109
+
110
+
## Service operations
111
+
112
+
Azure Cloud HSM doesn't have scheduled maintenance windows, but Microsoft notifies customers in advance of any anticipated impact. For details, see [Service operations](overview.md#service-operations).
Copy file name to clipboardExpand all lines: articles/cloud-hsm/service-limits.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,14 +5,18 @@ author: keithp
5
5
manager: davinune
6
6
ms.service: azure-cloud-hsm
7
7
ms.topic: reference
8
-
ms.date: 03/20/2025
8
+
ms.date: 03/31/2026
9
9
ms.author: keithp
10
10
---
11
11
12
12
# Azure Cloud HSM service limits
13
13
14
14
This article describes service limits for the resource type `microsoft.hardwaresecuritymodules/cloudHsmClusters` in Azure Cloud HSM.
15
15
16
+
## Hardware specifications
17
+
18
+
Azure Cloud HSM uses Marvell LiquidSecurity hardware security modules. These HSMs are validated to meet FIPS 140-3 Level 3 standards. For more information about compliance certifications, see [Compliance and certification](overview.md#compliance-and-certification).
19
+
16
20
## Object limits
17
21
18
22
The following table describes the limits for the number of objects that you can create in Azure Cloud HSM. The limits are per Cloud HSM instance. Key types are Rivest-Shamir-Adleman (RSA), elliptic curve (EC), and Advanced Encryption Standard (AES).
Copy file name to clipboardExpand all lines: articles/cloud-hsm/user-management.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn best practices for managing user identities, securing credent
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
6
ms.topic: best-practice
7
-
ms.date: 03/20/2025
7
+
ms.date: 03/31/2026
8
8
ms.author: mbaldwin
9
9
10
10
#customer intent: As a security administrator, I need to manage user identities and permissions in Azure Cloud HSM so that I can ensure security and compliance.
@@ -41,6 +41,12 @@ Protecting your HSM user credentials is paramount, because these credentials gra
41
41
42
42
Azure Cloud HSM does not retain access to your HSM user credentials. If you lose access to your credentials, Microsoft can't help.
43
43
44
+
## Protect your partition owner certificate
45
+
46
+
The partition owner certificate (`PO.crt`) is a critical component that you upload during HSM initialization. After you upload the partition owner certificate, you can't change it. If you upload an incorrect certificate, you must delete the Azure Cloud HSM resource and deploy again.
47
+
48
+
Store the partition owner certificate and its corresponding private key (`PO.key`) securely. Keep the private key offline whenever possible, because it's required only for initial signing and cryptography officer (CO) password resets. For more information about the partition owner private key, see [Secure your Azure Cloud HSM deployment](secure-cloud-hsm.md).
49
+
44
50
## Ensure your HSM users are available on all nodes of your cluster
45
51
46
52
When you create a user, the user is created on all three nodes of the Cloud HSM cluster if all nodes are available. However, unlike keys, Azure Cloud HSM service does not perform backend user synchronization. User management is fully customer managed.
0 commit comments