1. Cloud Security Alliance (CSA). (2017). Security Guidance for Critical Areas of Focus in Cloud Computing v4.0. Domain 5: Cryptography
Encryption
and Key Management
Page 68. The document states
"Hardware Security Modules (HSMs) are dedicated hardware-based crypto-processors that are used to securely generate and store encryption keys."
2. National Institute of Standards and Technology (NIST). (2020). Special Publication 800-57 Part 1 Revision 5: Recommendation for Key Management: Part 1 – General. Section 5.3.1
"Cryptographic Modules." This publication discusses the use of validated cryptographic modules (often implemented as HSMs) as a fundamental component for protecting keys and performing cryptographic operations securely.
3. Amazon Web Services (AWS). (n.d.). What is AWS CloudHSM? AWS Documentation. Retrieved from https://docs.aws.amazon.com/cloudhsm/latest/userguide/introduction.html. The documentation specifies
"AWS CloudHSM provides hardware security modules (HSMs) in the AWS Cloud. An HSM is a computing device that processes cryptographic operations and provides secure storage for cryptographic keys."
4. Subashri
S.
& Shanthi
V. (2014). A survey on security issues and key management in cloud computing. International Journal of Engineering and Technology
5(6)
4775-4781. Page 4778 discusses key management solutions
noting that HSMs are used to "provide a higher level of security for the keys."