Skip to content
Navigation Menu

IBM Cloud

  • CatalogCatalog
  • Cost EstimatorCost Estimator
  • DocsDocs
  • Catalog
  • Cost Estimator
  • Docs

  • Navigation settings

Error

Change theme

This feature is in early stage, some parts of the platform might not fully support different themes yet.

  • Log in
  • Sign up
  1. Catalog

Hyper Protect Crypto Services

Keep Your Own Key for cloud data encryption with a dedicated key management service built on FIPS 140-2 Level 4 certified HSM.

  • Date of last update: 07/20/2021
  • Docs
Type
  • Service
Provider
  • IBM
Updated on
  • 07/20/2021
Category
  • Security
Compliance
  • IAM-enabled
Related links
  • Docs
  • Terms

Pricing plans

PlanFeaturesPricing

Summary

Hyper Protect Crypto Services

    Already have an account? Log in
    Type
    • Service
    Provider
    • IBM
    Updated on
    • 07/20/2021
    Category
    • Security
    Compliance
    • IAM-enabled
    Related links
    • Docs
    • Terms

    Summary

    Keep Your Own Key for cloud data encryption with IBM Cloud Hyper Protect Crypto Services, a dedicated Key Management Service (KMS) and Hardware Security Module (HSM) service. This single tenant KMS provides exclusive control of encryption keys with key-vaulting provided by dedicated, customer controlled, FIPS 140-2 Level 4 certified HSMs.

    Features

    1. Key Management
    Key lifecycle management

    Hyper Protect Crypto Services provides a single-tenant key management service that allows you to create, import, rotate, and manage keys with standardized APIs. Once the encryption keys are deleted, you can be assured that your data is no longer retrievable.

    Encryption for IBM Cloud services

    By integrating with other IBM Cloud services, Hyper Protect Crypto Services offers the capability of bringing your own encryption to the cloud. The service provides double-layer protection for your cloud data by wrapping the encryption keys associated with your cloud services.

    Access management and auditing

    Hyper Protect Crypto Services integrates with IBM Cloud Identity and Access Management (IAM) to enable your granular control over user access to service resources. You can also monitor activities of Hyper Protect Crypto Services using IBM Cloud Activity Tracker with LogDNA service.

    2. Cloud HSM
    Customer-controlled HSM

    With Keep Your Own Key, Hyper Protect Crypto Services allows you to take the ownership of the HSM through assigning your own administrators and loading master keys. This ensures your full control of the entire key hierarchy where no IBM Cloud administrators have access to your keys.

    Cryptographic operations

    Hyper Protect Crypto Services supports Enterprise PKCS #11 for cryptographic operations. This includes generating keys, encrypting and decrypting data, signing data, and verifying signatures. The cryptographic functions are executed in HSMs and can be accessed through APIs to provide hardware-based protection for your applications.

    Security certification

    The service is built on FIPS 140-2 Level 4-certified hardware, the highest offered by any cloud provider in the industry. The HSM is also certified to meet the Common Criteria Part 3 conformant EAL 4.

    Compliance: GDPR, HIPAA, ISO 27001/27017/27018