Tag - Considerations

Hardware Security Module Security Considerations

A hardware security module (HSM) is a trusted platform for performing cryptographic operations and protecting keys. A main feature of the HSM architecture is its special co-processor that performs cryptography functions. HSMs also consist of a hardware-based random number generator, RAM, storage, and external interface. HSM-as-a-Service is a growing market, with many...

Five Considerations to Keep Your Cloud Secure

Originally published by Bell. Written by Jack Mann, Senior Technical Product Manager, Cyber Security, Bell. When you make the shift to the cloud, it’s easy to assume that your cloud service provider – whether that’s AWS®, Microsoft Azure®, Google® Cloud or any another vendor – will keep your data and workloads protected and secure. However, that’s not...

Announcing CSAP v1.2 Part 5: Implementation Considerations

Introducing Part 5 of the Common Security Architecture for Production (CSAP) Today we are publishing Part 5: Implementation Considerations of the Common Security Architecture for Production (CSAP) v1.2. The CSAP architects were keen to design an architecture that did not have any boxes labelled “magic happens here,” and Part 5 offers some insight into our thinking...