hardware security modules (HSM)
GPTKB entity
Statements (47)
Predicate | Object |
---|---|
gptkbp:instanceOf |
security hardware
|
gptkbp:canSupport |
multiple users
|
gptkbp:enables |
digital signatures
|
gptkbp:ensures |
data integrity
|
gptkbp:hasAccessTo |
gptkb:API
|
https://www.w3.org/2000/01/rdf-schema#label |
hardware security modules (HSM)
|
gptkbp:integration |
software applications
|
gptkbp:isAvailableIn |
cloud-based solutions
various form factors on-premises solutions hybrid solutions |
gptkbp:isCriticizedFor |
regulatory compliance
data protection |
gptkbp:isDesignedFor |
high-security applications
|
gptkbp:isFacilitatedBy |
access control
identity management secure transactions |
gptkbp:isFundedBy |
various vendors
|
gptkbp:isInvolvedIn |
FIPS 140-2
Common Criteria |
gptkbp:isPartOf |
network security
security architecture cryptographic systems enterprise security solutions data_center_security |
gptkbp:isProtectedBy |
physical tampering
|
gptkbp:isSubjectTo |
security audits
|
gptkbp:isUsedFor |
data encryption
key generation secure boot tokenization secure key exchange data decryption key wrapping SSL/TLS_acceleration |
gptkbp:isUsedIn |
telecommunications
IoT devices financial services cloud computing environments payment processing systems government applications healthcare_systems PKI_(Public_Key_Infrastructure) |
gptkbp:mayHave |
audit logs
|
gptkbp:provides |
secure key storage
|
gptkbp:supports |
encryption algorithms
|
gptkbp:usedFor |
cryptographic key management
|