What are hardware security modules (HSM), why we need them and how they work.

Поделиться
HTML-код
  • Опубликовано: 20 янв 2025

Комментарии • 46

  • @dmfh5646
    @dmfh5646 Год назад +10

    You're doing an amazing job of making difficult concepts easier to understand for those of us just starting off our cyber careers. Many thanks.

  • @wowgingermobile2123
    @wowgingermobile2123 2 года назад +3

    Again much appreciated your video! Just done my Security+ and I wish to learn so much more about HSM.

  • @justinclayton42
    @justinclayton42 Год назад +2

    Very well presented, the perfect level of depth

  • @googlewalle8904
    @googlewalle8904 2 года назад +2

    Hi Adrian. Probably the best summary of how HSMs work from a high level. I currently perform staging/whitelisting of SQL Servers IP Addresses on nCipher RFS Servers. I understand the process pretty well, but, myself and other Engineers differ on how for instance, an nCipher HSM protects a SQL Server data encryption key (DEK). We are in meetings, and they all act like the SQL DEK is stored on the HSM. And my understanding in brief terms, goes like this: 1) SQL TDE DEK, is the key that encrypts the SQL Database file. 2) I stage the SQL Servers IP Addresses in both an HSM and RFS Config file (that the HSM will later call). 3) In order to integrate SQL Database Servers into nCipher HSM, they must first have the Entrust Security World software installed, and then the SQLEKM.dll I believe, via an Option Pack. 4) Once that's all setup, they will create some accounts, and an account that maps to the the SQLEKM.dll provider that's installed and setup on SQL Database. 5) ( THIS is where I need validation on how I think this truly works ): They will run some SQL queries to setup/create an Asymmetric Key, i.e. a call made to the SQLEKM Provider, which interfaces with the HSM. 6) The HSM Master key creates a KEK (Key Encryption Key) which is processed by the SQLEKM, and the KEK is used via the tdeLogin/tdeCredential while at the same time, being protected by the SQLEKM Provider in the Entrust (nShield or nCipher) HSM, to finally, encrypt the SQL TDE "DEK" or data encryption key, and hence, you have the HSM providing Key Management....Is my explanation somewhat close or am I off a bit? I really want to understand this process and be able to tell the guys at work, and per Entrusts documentation, that the TDEDEK Symmetric key is "created by the SQL Server and CANNOT be exported from the database, meaning it cannot be created or directly protected by the SQLEKM Provider (nShield or nCipher HSM). I'm hoping for a reply from you, and, am also hoping for more in-depth videos on Entrust (or other Vendor) HSMs and the in-depth ways the process truly works. Also interesting is it's use in PKI. That I would like to learn more as well. Thank you for your time!!

    • @LearnCantrill
      @LearnCantrill  2 года назад +1

      Thanks for the comment. I’ll consider adding some focussed content on this.

  • @iceshad1
    @iceshad1 2 месяца назад

    Thx a lot! Very clear explanation!

  • @sub4god
    @sub4god 10 месяцев назад

    Thank you, great work!

  • @John-3692
    @John-3692 11 месяцев назад +1

    This is phenomenal. I had the privilege of reading something similar, and it was absolutely phenomenal. "Mastering AWS: A Software Engineers Guide" by Nathan Vale

  • @lukasbruderlin2723
    @lukasbruderlin2723 25 дней назад

    @LearnCantrill have you actually done the detail videos, you've mentioned? Couldn't find these on your channel.

  • @gritred5500
    @gritred5500 7 месяцев назад

    Great stuff explained very well!

  • @ИванЖалдкк
    @ИванЖалдкк Год назад +1

    thanks for the explanation!

  • @rohitshende934
    @rohitshende934 Год назад

    Lets say I want to store signing keys for the some tokens in HSM. Fist of all is this a good idea.? Second, if yes then does this not add latency to sign all tokens?

  • @ADAMSIVES
    @ADAMSIVES 8 месяцев назад

    Excellent video thanks!

  • @micael1984
    @micael1984 9 месяцев назад

    It is what I'm looking for. Thank you

  • @QueLastima
    @QueLastima 2 года назад

    This was exactly what I was looking for. Thanks.

  • @sachistic12
    @sachistic12 Год назад

    Thanks for the easy explanation

  • @Rahul-lg1nw
    @Rahul-lg1nw 2 года назад +1

    how to make a data vault on top of HSM for storing credentials??

    • @LearnCantrill
      @LearnCantrill  2 года назад

      it depends which HSM, this video is a general concept video ... the HOW would be based entirely on what HSM you use.

  • @MarlonUrias
    @MarlonUrias 2 месяца назад

    You say the keys never leave the HSM, but doesn't it generate public keys that are shared with the world?

  • @reya4182
    @reya4182 2 года назад +1

    Such a great explanation 👏👏👏 . There is no such series for this. It would be great if you could make one Azure Managed HSM and how to implement it using terraform

  • @johnmartin5190
    @johnmartin5190 Год назад

    So what are some vulnerabilities to having a HSM?

  • @don156
    @don156 2 года назад

    This is great, thank you very much

  • @itsredhwan
    @itsredhwan 2 года назад

    Amazing explanation thanks a million! One thing here how we should integrate it with KMIP?

    • @LearnCantrill
      @LearnCantrill  2 года назад

      thanks, glad you like it. KMIP is a little bit beyond the scope of this one, maybe another video :)

  • @zebulongriggs4986
    @zebulongriggs4986 2 года назад

    Great video! Which playlist should I watch to continue the HSM learning?

    • @LearnCantrill
      @LearnCantrill  2 года назад

      I don't really have (yet) any other more detailed videos on HSM

  • @owendcunha8906
    @owendcunha8906 2 года назад

    Hey Adrian I just wanted to let you know that you have added HSM Pictures in tech fundamentals learning aid in associate solution architect cource GitHub repository . I was a bit confused when I found it while going through the learning aids and instantly came here to know what HSM means

  • @m.imraniqbaal6912
    @m.imraniqbaal6912 Год назад

    Perfect 👍

  • @jimmykrokaa
    @jimmykrokaa 4 месяца назад

    We're all in this together! Hello? Troy? Gabriella? I'm sorry. I think I'm supposed to be here tomorrow night.

  • @mehulpruthi
    @mehulpruthi 2 года назад

    Does HSM store software keys?

    • @LearnCantrill
      @LearnCantrill  2 года назад

      What do you mean by "software keys" ?

  • @embeddedroom
    @embeddedroom 7 месяцев назад

    HeyCeSem :)

  • @VanMignon
    @VanMignon 3 месяца назад

    57131 Nichole Isle

  • @EmmieScott-z4k
    @EmmieScott-z4k 4 месяца назад

    Daron Parkways

  • @bille7585
    @bille7585 Год назад

    Raspberi Pi's ??