Overview
VaultWares Hardware Security Modules (HSMs) provide dedicated, tamper-resistant hardware for cryptographic operations and key management. HSMs protect your most sensitive cryptographic keys and perform encryption, decryption, signing, and authentication operations at high speed.Product lineup
VaultHSM PCIe
Form factor: PCIe x4 card
Performance: 10,000 RSA ops/sec
Certification: FIPS 140-2 Level 3
Performance: 10,000 RSA ops/sec
Certification: FIPS 140-2 Level 3
VaultHSM Network
Form factor: 1U rack-mount appliance
Performance: 25,000 RSA ops/sec
Certification: FIPS 140-2 Level 3
Performance: 25,000 RSA ops/sec
Certification: FIPS 140-2 Level 3
VaultHSM Enterprise
Form factor: 2U rack-mount appliance
Performance: 100,000 RSA ops/sec
Certification: FIPS 140-3 Level 4
Performance: 100,000 RSA ops/sec
Certification: FIPS 140-3 Level 4
VaultHSM Cloud
Deployment: Cloud-based HSM service
Performance: Scalable on-demand
Certification: FIPS 140-2 Level 3
Performance: Scalable on-demand
Certification: FIPS 140-2 Level 3
Key features
Cryptographic operations
- Key generation: RSA, ECC, AES, DES/3DES
- Digital signatures: RSA, ECDSA, EdDSA
- Encryption/decryption: Symmetric and asymmetric algorithms
- Hashing: SHA-2, SHA-3 family
- Key derivation: PBKDF2, HKDF, X9.63
- Random number generation: True hardware RNG (TRNG)
Security features
- Tamper detection: Physical intrusion triggers automatic key zeroization
- Secure key storage: Keys never leave the HSM in plaintext
- Role-based access: Separation of duties with multiple administrator roles
- Audit logging: Comprehensive cryptographic operation logs
- Backup and recovery: Secure key backup with M-of-N key splitting
- FIPS compliance: Certified cryptographic modules
High availability
- Clustering: Active-active or active-passive configurations
- Load balancing: Distribute operations across multiple HSMs
- Automatic failover: Seamless operation during hardware failures
- Hot-swappable: Replace failed units without downtime (network models)
Technical specifications
- VaultHSM PCIe
- VaultHSM Network
- VaultHSM Enterprise
- VaultHSM Cloud
| Specification | Details |
|---|---|
| Form factor | PCIe x4 low-profile card |
| Performance | 10,000 RSA-2048 ops/sec, 50,000 AES ops/sec |
| Algorithms | RSA, ECC, AES, 3DES, SHA-2/3 |
| Key storage | 10,000 keys |
| Power | 25W maximum |
| Operating temp | 0°C to 50°C |
| Dimensions | 167mm x 69mm (half-height) |
| Certification | FIPS 140-2 Level 3, Common Criteria EAL4+ |
| Warranty | 3 years |
Use cases
PKI and certificate management
Code signing
Database encryption
SSL/TLS offloading
Setup and configuration
Initial setup
1
Install hardware
For PCIe models, install the card in an available PCIe slot. For network models, rack mount and connect power and network cables.
2
Initialize HSM
3
Create security officer
4
Configure network (network models)
High availability setup
Key management
Key generation
Key backup and recovery
Key rotation
Integration examples
PKCS#11 integration
Java integration
OpenSSL integration
Monitoring and audit
Enable audit logging
View audit logs
Performance monitoring
Compliance and certifications
FIPS 140-2/140-3
FIPS 140-2/140-3
VaultHSM products are certified to FIPS 140-2 Level 3 or FIPS 140-3 Level 4, providing:
- Cryptographic module validation
- Physical security mechanisms
- Role-based authentication
- Secure key management
Common Criteria
Common Criteria
Evaluated and certified to Common Criteria EAL4+ or EAL5+ for security functionality.
PCI DSS
PCI DSS
Meets PCI DSS requirements for cryptographic key management and protection of cardholder data.
eIDAS
eIDAS
Qualified for use in eIDAS-compliant digital signature solutions (EU).
Troubleshooting
HSM not detected
HSM not detected
- Verify power connections (network models)
- Check PCIe slot compatibility (PCIe models)
- Ensure drivers are installed:
vw-hsm-driver --version - Check system logs:
journalctl -u vaulthsm
Performance degradation
Performance degradation
- Check CPU and memory usage on host
- Verify network latency (network models)
- Review queue depth:
vw-hsm status --verbose - Consider adding HSMs to cluster for load distribution
Authentication failures
Authentication failures
- Verify PIN/password is correct
- Check if account is locked:
vw-hsm user-status - Review audit logs for failed attempts
- Reset user PIN if necessary (requires SO privileges)
Cluster synchronization issues
Cluster synchronization issues
- Verify network connectivity between cluster members
- Check time synchronization (NTP)
- Review cluster status:
vw-hsm cluster status - Force resync:
vw-hsm cluster sync --force