Skip to content

IBM-Cloud/hpcs-management-utilities

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 

Repository files navigation

Hyper Protect Crypto Services Management Utilities

IBM Cloud™ Hyper Protect Crypto Services (Hyper Protect Crypto Services for short) is a dedicated key management service and hardware security module (HSM). It is designed to enable you to take control of your cloud data encryption keys and cloud hardware security modules, and is the only service in the industry built on FIPS 140-2 Level 4-certified hardware. For an introduction to the service, see service overview.

Provisioning the service

Follow the instruction on service provisioning to provision a service instance of Hyper Protect Crypto Services in IBM Cloud.

Initializing the service instance

After you provision a service instance, you need to initialize your service instance by loading the master key. You can choose to load the master key using the Management Utilities or from your workstation using the IBM Cloud Trusted Key Entry (TKE) CLI plug-in.

Using the Management Utilities

If you need a highly secured environment to protect sensitive data and need to meet the highest level of security compliance requirements, use the Management Utilities to initialize the service instance. To enable this solution, you need to use smart cards, which stores and encrypts the administrator signature key and master key parts, and provides hardware based protection. You also need additional devices such as the smart card readers, and additional applications such as the IBM Cloud Trusted Key Entry (TKE) client application and Smart card utility application so as to load the master key. For more information, see Understanding the Management Utilities.

For detailed instruction on how to set up the Management Utilities, including smart cards, smart card readers, TKE client application, and Smart card utility application, see Setting up Management Utilities.

Files included in this repository

The Release tab of this repository contains the latest installation file cloudtke.bin to set up the Hyper Protect Crypto Services Management Utilities.

The following files are also included in the repository to enable signed code verification. This is to ensure the integrity and authencity of cloudtke.bin after being downloaded:

  • cloudtke.sig: The signed cryptographic hash of cloudtke.bin (SHA-256).
  • digicert_cert.pem: An intermediate code signing certificate to prove the Management Utilities signing certificate.
  • signing_cert.pem: The signing certificate of the Management Utilities.

For detailed steps of verifying the signature and installing the Management Utility, refer to the Management Utilities installation instructions.