Skip to content
Inovasense

HSM

Hardware Security Module (HSM) — A dedicated, tamper-resistant physical device for cryptographic key management, digital signing, and encryption in high-security environments.

HSM — Hardware Security Module

A Hardware Security Module (HSM) is a dedicated, tamper-resistant physical computing device that safeguards and manages cryptographic keys, performs digital signing, and accelerates encryption operations. HSMs provide the highest level of protection for cryptographic material — significantly stronger than software-based keystores.

What Does an HSM Do?

An HSM performs three core functions:

  1. Key generation & storage — Creates cryptographic keys inside a tamper-proof boundary. Keys never leave the HSM in plaintext.
  2. Cryptographic operations — Encrypts, decrypts, signs, and verifies data using keys stored internally.
  3. Access control & audit — Enforces strict authentication policies (multi-party, M-of-N) and logs all operations for compliance.

Types of HSMs

TypeForm FactorTypical UseCertification
Network HSMRack-mounted applianceData center PKI, TLS termination, code signingFIPS 140-3 Level 3
PCIe HSMCard inserted into a serverCloud KMS, database encryptionFIPS 140-3 Level 3
USB HSMUSB token / dongleDeveloper signing, small-scale PKIFIPS 140-2 Level 2–3
Secure ElementTiny IC on a PCBIoT device identity, secure bootCC EAL6+
Embedded HSMIP block in SoC/FPGAAutomotive ECUs, industrial controllersISO/SAE 21434

Secure Elements (e.g., STMicroelectronics STSAFE-A110, Infineon OPTIGA Trust M, NXP EdgeLock SE050) are miniaturized HSMs designed for embedded and IoT applications — combining key storage with secure boot verification in a tiny package.

HSM vs. Software Keystores

AspectHSM (Hardware)Software Keystore
Key extractionImpossible — keys never leave the devicePossible if memory is compromised
Tamper resistancePhysical intrusion detection, zeroizationNone
PerformanceHardware-accelerated crypto (RSA, ECC, AES)CPU-bound, slower
CertificationFIPS 140-3, Common CriteriaNo hardware certification possible
CostHigher upfront ($1–$50k for network HSMs)Free / low cost

Why HSMs Matter for IoT

As the EU Cyber Resilience Act (CRA) imposes mandatory security requirements on connected products from 2027, HSMs — especially secure elements — become essential for:

  • Device identity — Each IoT device gets a unique, hardware-anchored cryptographic identity.
  • Secure boot — Verifying firmware integrity before execution.
  • Secure OTA updates — Authenticating over-the-air firmware updates.
  • Key provisioning — Injecting device certificates during manufacturing.
  • Data protection — Encrypting sensitive sensor data at rest and in transit.

HSM Standards & Certifications

StandardFocusLevel
FIPS 140-3Cryptographic module security (US/global)Level 1–4
Common Criteria (CC)Security evaluation framework (EU/global)EAL1–EAL7
PCI HSMPayment card industry key management
eIDASEU electronic identification & trust servicesQualified
  • Secure Boot — Chain of trust that relies on HSM-stored keys.
  • IoT — Connected devices requiring hardware key management.
  • EU Cyber Resilience Act — Regulation driving HSM adoption in consumer products.