Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Folks shouldn't necessarily be scared off by the use of HSMs in this model -- HSMs are an add-on that adds an additional layer of security. That said, there are still significant wins to segmenting the applications that hold keys, particularly if they are on hosts separate from your front-end or application logic hosts. This architecture still forces attackers to only have access to data within your infrastructure, which allows your detection systems to have a chance to catch people before they leave with all the data.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: