Home Security Hyper Protect Crypto Services
IBM Cloud Hyper Protect Crypto Services

Secure and simple multicloud key management

See product pricing

IBM Cloud® Hyper Protect Crypto Services is an as-a-service (aaS) key management and encryption solution, which gives you full control over your encryption keys for data protection.

The integrated Unified Key Orchestrator acts as a secure key repository for distributing and orchestrating keys across multiple clouds, enabling quick recovery from key loss or disasters. With Hyper Protect Crypto Services, you can: 

  • build on the highest level of security with FIPS 140-2 level 4 certified hardware;
  • experience a worry-free approach to multicloud key management through the all-in-one as-a-service solution and benefit from automatic key backups and built-in high availability secure business continuity and disaster recovery;
  • manage your keys seamlessly across multiple cloud environments and create keys securely and bring your own key seamlessly to hyperscalers such as Microsoft Azure AWS and Google Cloud Platform to enhance the data security posture and gain key control; and
  • protect data by pervasively encrypting data at rest and in transit with Keep Your Own Key (KYOK), having full control and authority over encryption keys and sole access to your master key.
Unified Key Orchestrator got awarded the Red Dot Award: Brands & Communication Design 2023.
Get started

Get two production grade crypto units at no charge for 30 days with code HPCRYPTO30

Getting started with IBM Cloud Hyper Protect Crypto Services

Benefits Enhance your data security posture and handle keys with ease. Control keys exclusively with technical assurance

Encrypt integrated IBM Cloud Services and applications with KYOK. Retain complete control of your data encryption keys with technical assurance and provide runtime isolation with confidential computing.

Integrate IBM Cloud services with Hyper Protect Crypto Services
Manage keys effortlessly across clouds

Enhance security and manage keys with Unified Key Orchestrator across IBM Cloud, Microsoft Azure, AWS and Google Cloud Platform, maximizing efficiency with its award-winning user experience.

Protect sensitive data while keeping control over your keys
Support quantum-safe cryptography

Protect your sensitive data with quantum-safe measures by using Hyper Protect Crypto Services' Dillithium for quantum-safe signing. Use a key management system to ensure crypto agility and future-proof your security against quantum threats.

Quantum-Safe Cryptography to protect data in the hybrid era
High security encryption and asset protection

Use the FIPS 140-2 Level 4 hardware security module to leverage the highest security level in the industry to store and transfer high-value digital assets in highly secure wallets reliable at scale.

Cloud HSM introduction
Meet compliance requirements

Adhere to various global guidelines and regulations, including those from NIST, GDPR, C5, ACSC/ASC, ECUC, ENISA, DPDPA, DORA and more. By maintaining control over your keys, you can achieve complete data privacy and sovereignty, enhancing data protection and control.

Security and compliance
Features
Worry-free multicloud key management Create keys securely and seamlessly in a multicloud environment, including Microsoft Azure, AWS and Google Cloud Platform. Manage your keys under your exclusive control with a generic key lifecycle model based on NIST recommendations. Monitor the lifecycle of encryption keys in Unified Key Orchestrator

HSM APIs and adapters Use the API to interact with the key management service (KMS) to manage root keys and standard keys. The service is built on FIPS 140-2 Level 4 certified hardware and PKCS #11 is supported. Single-tenant dedicated HSM domains are fully controlled by you, and IBM Cloud administrators have no access—the highest security offered by any cloud provider in the industry. Encrypt your data with cloud HSM
Additional features IBM Cloud service encryption and key lifecycle management

Encrypt IBM Cloud services with keys under your control through KYOK integration for consistent adoption. Use a user-friendly GUI and Cloud APIs to track key lifecycles, ensuring unrecoverable deletion of data regardless of the source application.

Monitor the lifecycle of encryption keys
Service initialization through key ceremony

Take ownership of HSM. IBM is the first to provide cloud command-line interface (smart cards) for the HSM key ceremony to operate your HSM fully remotely. Key ceremony and smart cards management software is made available in the offering (with no extra charge).

Initialize your service instance
Built-in high availability and disaster recovery

Use a built-in central backup to redistribute and rotate keys to quickly recover from loss and minimize security threats. High availability and disaster recovery are available in the offering.                                              

High availability and disaster recovery

Use cases

Discover business scenarios of Hyper Protect Crypto Services.

Encrypt storage devices with KYOK The data in IBM Cloud services is encrypted with randomly generated keys. To enhance protection, you can control the encryption keys and use your own keys to encrypt your data. Also, you can use root keys in Hyper Protect Crypto Services to your cloud service of choice and leverage envelope encryption to add another layer of protection, KYOK, to your data, no one else including IBM Cloud administrators can access your data. Start to encrypt Integrated IBM Cloud Services with KYOK

Enhance data security and reduce operational efforts in the multi cloud Enhance data privacy for sensitive data, reduce risk in the cloud and establish a high-security ecosystem across AWS, Azure and GCP with customer-managed keys, also known as Bring Your Own Key (BYOK). With Unified Key Orchestrator, you can create, manage, and delete your cryptographic keys from one point of control, without dealing with different user interfaces. Ensure an efficient and fully audited key lifecycle management. Protect data in multi cloud environment

Encrypt Kubernetes Secrets with HPCS Safeguard highly sensitive data by using your own keys for encryption and manage your encryption keys with complete control. Hyper Protect Crypto Services creates highly secure keys and provides you with the exclusive control over the entire key hierarchy, including the master key of the HSM that protects the secrets as a service. Explore the tutorial

Use Secure HSM generated Key for HashicorpVault Learn how to integrate the FIPS 140-2 Level 4 certified HSM of IBM Cloud Hyper Protect Crypto Services with the auto-unseal and seal-wrap features of HashiCorp Vault Enterprise for privileged access management. Explore the tutorial

Enhance your data security posture in VMware Encrypt this storage through highly secure, industry-standard algorithms. To ensure that your sensitive and valuable data is protected, you can now leverage the KMIP adapter to use keys under your control from IBM Cloud Hyper Protect Crypto Services.

Protect data by pervasively encryption Data at rest and in transit with KYOK The data in IBM Cloud services is encrypted with randomly generated keys. To enhance protection, you can control the encryption keys and use your own keys to encrypt your data. Additionally, you can use root keys in Hyper Protect Crypto Services to your cloud service of choice and leverage envelope encryption to add another layer of protection - keep your own key (KYOK)- to your data, no one else including IBM Cloud administrators can access your data. Start to encrypt Integrated IBM Cloud Services with KYOK

Resources IBM Cloud Hyper Protect Crypto Services docs

Discover procedures, API and CLI references as well as video resources that assist you to securely manage your keys using Hyper Protect Crypto Services.

Integration with IBM Cloud for VMware

Explore an overview of IBM Cloud Hyper Protect Crypto Services for VMware.

Integration with AWS KMS

Learn how to securely manage AWS S3 encryption keys by using Hyper Protect Crypto Services with Unified Key Orchestrator.

Related products IBM Hyper Protect Virtual Servers

Gain authority over LinuxONE virtual servers for workloads with sensitive data or business IP.

IBM Hyper Protect Virtual Servers (on premises)

Read the announcement about the new on-premises solution that lets you securely build deploy and manage critical applications for hybrid cloud.

Unified Key Orchestrator for IBM z/OS®

A key management solution that centrally orchestrates and secures the lifecycle of encryption keys across your enterprise for both on premises and multiple cloud environments.

Get started

Use promo code HPCRYPTO30 to get two production grade crypto units at no charge for 30 days or book a meeting to get a trial instance that is free of charge.

See product pricing
More ways to explore Documentation