December 21, 2018 By Christopher Smith 2 min read

IBM Cloud Hyper Protect Crypto Services

IBM Cloud Hyper Protect Crypto Services offers highly regulated organizations a managed cryptographic service in the cloud. It provides dedicated control down to the root secret of the Hardware Security Module. The Hardware Security Modules are FIPS 140-2 level 4 certified. This accounts for reliable protection of your keys, certificates, and cryptographic operations.

As part of the IBM Hyper Protect family of services, it introduces protection even from privileged users. It comprises built-in high availability and scaling capabilities, which addresses always-on requirements of the digital enterprise.

With Keep Your Own Key, Hyper Protect Crypto Services assures that all your secrets are always kept under control of keys that you own.

Key management service

A key management service like IBM Key Protect manages the entire lifecycle of keys. This ranges from key creation through application use, key archival, and key destruction. It enforces separation of duties between data management and key management.

Company policies, industry best practices, and government regulations increasingly require data-at-rest encryption. Encryption key management is a fundamental requirement for data storage, management, and governance. IBM Key Protect helps clients secure their sensitive data from unauthorized access or inadvertent employee release while meeting compliance auditing standards. Learn more about Key Protect here.

Hyper Protect Crypto Services is a drop-in replacement for IBM Key Protect and exposes the same key management services. As a single-tenant service, it offers dedicated control of the Hardware Security Module per customer. It extends the family of key management services in the IBM Cloud towards single-tenant instances with dedicated hardware secret control.

Check out IBM Cloud Hyper Protect Crypto Services now!

New with this experimental update

  • Hyper Protect Crypto Services transitions from a backend Hardware Security Module for IBM Key Protect to a stand-alone key management system functionality. There is no further need to set up both services (all-in-one solution).

  • HSM Master Keys can now be customer managed (setup/delete) with an IBM Cloud CLI add-on from on-premises.

  • Deprecation of Advanced Crypto Service Provider (ACSP) Remote Hardware Security Module Services.

    • Already deployed experimental instances will continue to work until further notice.

    • No further management of experimental instances (create, delete, manage).

    • Attention: Please keep in mind that no migration is supported for experimental services.

  • Temporary unavailability of Hardware Security Module services in the updated service until further notice.

We are working on bringing back the Hardware Security Module function with cloud-ready interfaces (Enterprise PKCS#11). We will keep you posted in this blog.

More from Announcements

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM and MuleSoft expand global relationship to accelerate modernization on IBM Power 

2 min read - As companies undergo digital transformation, they rely on APIs as the backbone for providing new services and customer experiences. While APIs can simplify application development and deliver integrated solutions, IT shops must have a robust solution to effectively manage and govern them to ensure that response times and costs are kept low for all applications. Many customers use Salesforce’s MuleSoft, named a leader by Gartner® in full lifecycle API management for seven consecutive times, to manage and secure APIs across…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters