HSM
securityFull Name: Hardware Security Module
Definition
A Hardware Security Module (HSM) is a hardened, tamper-resistant physical computing device designed specifically for managing cryptographic keys and performing cryptographic operations (signing, encryption, decryption, key generation) in a secure environment. HSMs provide the highest level of key protection because private keys are generated inside the module, used for operations inside the module, and never exported in plaintext. Physical tamper detection mechanisms destroy keys if the device is physically attacked. In the EUDI Wallet ecosystem, HSMs are the trust anchors -- they protect the signing keys of credential issuers, Certificate Authorities, and Trusted List operators. If these keys were compromised, attackers could forge credentials, fake certificates, or poison the trust framework.
How HSMs Protect Cryptographic Keys
HSMs provide multiple layers of protection for cryptographic keys:
- •Key generation inside the boundary: Private keys are generated within the HSM using a certified random number generator. The keys never exist outside the HSM's tamper-resistant boundary in unencrypted form.
- •Cryptographic operations inside the boundary: When a credential issuer needs to sign a credential, the credential hash is sent to the HSM, the HSM performs the ECDSA signing operation internally, and returns only the signature. The private key never leaves the HSM.
- •Physical tamper protection: HSMs include sensors that detect physical intrusion attempts (drilling, cutting, probing). If tampering is detected, the HSM immediately destroys (zeroizes) all stored keys. Some HSMs also include electromagnetic shielding to prevent side-channel attacks.
- •Access control: HSMs require multi-party authentication (M of N smart cards or PINs) for sensitive operations like key generation or backup. No single person can extract or use keys without the required quorum of authorized personnel.
HSM Deployment in the EUDI Trust Chain
HSMs appear at every critical point in the EUDI trust chain:
Root Certificate Authorities: The highest-assurance HSMs (FIPS 140-2 Level 4, Common Criteria EAL4+) protect root CA keys that anchor the entire trust chain. These HSMs are often kept offline in secure facilities and brought online only for certificate signing ceremonies conducted under strict procedural controls with multiple witnesses.
Credential Issuers: Government agencies and organizations that issue credentials (PIDs, driving licenses, diplomas) use online HSMs to sign credentials at high volume. A national PID issuer might sign millions of credentials, each requiring an ECDSA signature generated within the HSM. Cloud HSM services (like AWS CloudHSM or Azure Dedicated HSM) are increasingly used for scalable deployment within EU-sovereign data centers.
Trusted List Operators: The entities that maintain and sign EU Trusted Lists use HSMs to protect the signing keys that authenticate the lists. Since all EUDI Wallets rely on Trusted Lists to determine which issuers are legitimate, compromising these keys would undermine the entire trust framework.
Cloud HSMs and EU Data Sovereignty
Modern EUDI deployments increasingly use cloud-based HSM services that provide dedicated HSM hardware within cloud data centers. These services offer the same security certifications (FIPS 140-2 Level 3) as on-premises HSMs while providing cloud-native integration, automatic scaling, and geographic distribution.
However, cloud HSMs for EUDI infrastructure must comply with EU data sovereignty requirements. The HSMs must be physically located within EU territory, operated by entities under EU jurisdiction, and not subject to extraterritorial data access laws. Some Member States may require on-premises HSMs for the highest-assurance operations (root CA key ceremonies, national PID issuance). The EUDI framework provides flexibility for each Member State to determine the appropriate HSM deployment model based on their national security requirements.