Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 461

Hardware Security Module (HSM)

What is Hardware Security Module (HSM)?

Hardware Security Module (HSM)Tamper-resistant hardware appliance that generates, stores, and uses cryptographic keys without ever exposing the raw key material to the operating system.


An HSM is a dedicated device, card, or cloud service that performs cryptographic operations (sign, verify, encrypt, decrypt, key wrap) inside a hardened security boundary. Keys are generated on-device, never leave in plaintext, and many models are certified under FIPS 140-2 or FIPS 140-3 at Levels 2 to 4 and Common Criteria. HSMs back PKIs, code signing pipelines, payment systems (PIN, EMV), TLS termination, database encryption, and cloud KMS offerings such as AWS CloudHSM, Azure Dedicated HSM, and Google Cloud HSM. Physical and logical protections include tamper detection, key zeroization, and role-separated quorum administration.

Examples

  1. 01

    A root CA private key generated and used only inside an offline FIPS 140-3 Level 3 HSM.

  2. 02

    PCI HSMs used to process card PIN translation in a payment switch.

Frequently asked questions

What is Hardware Security Module (HSM)?

Tamper-resistant hardware appliance that generates, stores, and uses cryptographic keys without ever exposing the raw key material to the operating system. It belongs to the Cryptography category of cybersecurity.

What does Hardware Security Module (HSM) mean?

Tamper-resistant hardware appliance that generates, stores, and uses cryptographic keys without ever exposing the raw key material to the operating system.

How does Hardware Security Module (HSM) work?

An HSM is a dedicated device, card, or cloud service that performs cryptographic operations (sign, verify, encrypt, decrypt, key wrap) inside a hardened security boundary. Keys are generated on-device, never leave in plaintext, and many models are certified under FIPS 140-2 or FIPS 140-3 at Levels 2 to 4 and Common Criteria. HSMs back PKIs, code signing pipelines, payment systems (PIN, EMV), TLS termination, database encryption, and cloud KMS offerings such as AWS CloudHSM, Azure Dedicated HSM, and Google Cloud HSM. Physical and logical protections include tamper detection, key zeroization, and role-separated quorum administration.

How do you defend against Hardware Security Module (HSM)?

Defences for Hardware Security Module (HSM) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Hardware Security Module (HSM)?

Common alternative names include: HSM.

Related terms

See also