nShield Bring Your Own Key

nShield BYOK uses certified HSMs to strengthen the security of your sensitive data in the cloud and puts you in control of the generation, storage and export of your keys

nShield Bring Your Own Key (BYOK)

With nShield Bring Your Own Key (BYOK), you bring your own keys to your cloud applications, whether you’re using Amazon Web Services (AWS), Google Cloud Platform (GCP) or Microsoft Azure. nShield high-assurance HSMs let you continue to benefit from the flexibility and economy of cloud services while you strengthen the security of your key management practices and gain greater control over your keys.

Watch our Video, Bring Your Own Key with nCipher and Microsoft Azure, to see how nShield BYOK can strengthen your cloud key management practices.

Download our Solution Brief, nShield Bring Your Own Key, to learn more about how nShield BYOK gives you greater control over your keys.

Safer key management

Backed by FIPS 140-2 Level 2 and 3 nShield HSMs, nShield BYOK helps you adopt safer key management practices that strengthen the security of your sensitive data in the cloud.

Stronger control over your keys

With nShield Bring your Own Key, you use your own nShield HSMs in your own environment to create, store and securely export your keys to the cloud.

Superior key generation

nShield HSMs use a certified, high-entropy random number generator to create keys of higher quality than typically generated in software.

Certified hardware root of trust

nShield BYOK is based on nShield Edge, Solo and Connect HSMs, which are certified to FIPS 140-2 Level 2 and 3. This certification ensures that nShield HSMs have been tested to stringent standards, including for their tamper-resistance features. See our product pages for complete lists of standards these platforms comply with.

To Bring Your Own Key to Microsoft Azure, two options are available

nCipher BYOK

You can bring your own keys (BYOK) to your cloud applications. If you’re using Microsoft Azure, you will generate your keys on premises, and then securely transfer your keys to the nShield HSM running within the Azure infrastructure. With this approach, you get seamless nShield HSM-backed security in your environment and in Azure Key Vault. The key generated in your on-premises HSM is tightly bound to the nShield HSM/Security World environment. It can only be transported to and used in Azure Key Vault and provides assurance that the key permissions created at generation time are faithfully preserved during the transfer to Microsoft Azure.

Azure BYOK

This new key import method of BYOK for Azure Key Vault, allows customers to generate and transfer encryption keys to Azure Key Vault using an on-premises or as a service nShield HSM. This method differs from nCipher BYOK in that it is open standards based accommodating other HSM vendors. It does not offer the same key usage controls and security properties as the nCipher BYOK. To use Azure BYOK requires an nShield HSM and nCipher’s Cloud Integration Option Pack product.

nShield BYOK for AWS and GCP

If you’re using AWS or GCP, you will generate your keys on premises, and then lease your keys to AWS or GCP for temporary use in the cloud. After a pre-determined time period, your keys in the cloud will be destroyed. If needed, you can again lease the keys stored in your HSM. You can also store and manage your master keys in your on-premises nShield HSM. Requires nCipher’s Cloud Integration Option Pack product.

Multi-cloud Service

nShield BYOK lets you choose your cloud service provider, even from the same HSM. Your on-premises nShield HSM will send keys to whichever cloud provider you choose, whenever you choose.

Want to be part of our team? Explore
Get in contact with a specialist Contact Us