- Newest
- Most votes
- Most comments
Hello,
I would like to mention that yes, it's possible to use a CloudHSM cluster remotely.
However, there are four prerequisites that must be satisfied:
-
Network connectivity between the client instances (in this case, the local desktops) and the CloudHSM cluster. This could be accomplished by using VPN connections, Direct Connect connections, etc.
-
Copy of the customerCA.crt [1] certificate to the client instances.
-
Creation of a Crypto-User for the desktop computers.
-
Installation of the CloudHSM package. For your scenario, this could be the issue. If you are using, for example, Windows 10 or Windows 11 in the desktops, we don't have any CloudHSM package for theses operating systems. You can try to use the package for Windows Server 2016/2019. [2]
Please note that for such custom solution queries, we have the dedicated AWS Solutions Architect team which addresses the architecture and design level queries. I would suggest you reaching out directly to our Sales team as they can help you to get in touch with our Solutions Architect (SA) team.
You can request for a member of the sales (Business Development) team to contact you using any of the following methods:
>> Via form: http://aws.amazon.com/contact-us/aws-sales/
>> Via Live Chat: https://pages.awscloud.com/live-chat-contact-us.html
>> Phone support: +1 (833) 662-9873 - 6:30am - 4:00pm (Pacific) Monday - Friday.
References:
[1] https://docs.aws.amazon.com/cloudhsm/latest/userguide/initialize-cluster.html#sign-csr-create-cert
[2] https://docs.aws.amazon.com/cloudhsm/latest/userguide/client-history.html#client-version-5-5-0
Thanks that's helpful. Our existing Authenticode cert doesn't expire until summer 2023 so for now we've decided to wait for other people to have this problem and hopefully post solutions. I expect Amazon will be getting more requests for desktop cloudHSM support as we get closer to DigiCert and others requiring HSM for their new and renewal certificates.
Relevant content
- AWS OFFICIALUpdated 2 years ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated a year ago
You can do it without having the client (i.e., the one performing the signing operation) having network access to the HSM. We do this via a signing proxy that sits in front of the HSM and performs authn/authz and then offloads signing to the HSM. We run signing tools (e.g., signtool, jarsigner, rpmsign, cosign, etc.) from our client machine, the cryptographic service provider then offloads that to the proxy, then the proxy offloads to the HSM. It is basically just web services behind the scenes and the approach uses client-side hashing to ensure that the data sent over the network is minimal so performance isn't impacted.