Skip to content

Hyper Protect Crypto Services

IBM Cloud Hyper Protect Crypto Services provides you with exclusive control of your encryption keys in the highest security level. You can connect your Hyper Protect Crypto Services instance to third-party keystores, and back up and manage keys across multiple clouds, including AWS, Azure, and more.

Key value

This is a dedicated key management service and Hardware Security Module (HSM) that provides you with the Keep Your Own Key capability for cloud data encryption. Built on FIPS 140-2 Level 4 certified hardware, Hyper Protect Crypto Services provides you with exclusive control of your encryption keys.

Important

Unauthorized parties, including IBM Cloud admins, have no access to your encryption keys at any time. In cases where your application encrypts data with those keys, no other parties have access to your data.

Video

See IBM Cloud Hyper Protect Crypto Services overview

Use cases

Also see Use cases - Standard Plan

Manage regulated workloads

With Hyper Protect Crypto Services, you have two options to encrypt your workloads:

Hyper Protect Crypto Services Integrations with IBM Cloud

Use

Explore: Integrating IBM Cloud services with Hyper Protect Crypto Services including:

The following diagram illustrates the scene of integrating Hyper Protect Crypto Services with two services.

hpcs integrations

Security and compliance

IBM Cloud® Hyper Protect Crypto Services has data security strategies in place to meet your security and compliance needs and ensure that your data remains protected in the cloud.

For more details, see Security and compliance.

Envelope encryption

Envelope encryption is the practice of encrypting data with a data encryption key (DEK) and then wrapping the DEK with a root key that you can fully manage. The root keys in Hyper Protect Crypto Services service instance are also wrapped and protected by the hardware security module (HSM) master key.

This key wrapping process creates wrapped DEKs that protect your stored data from unauthorized access or exposure. Unwrapping a DEK reverses the envelope encryption process by using the same root key, resulting in decrypted and authenticated data. Root keys that are managed in a Hyper Protect Crypto Services service instance are also encrypted by the master key that ensures you full control of the entire key hierarchy.

The following diagram shows a contextual view of envelope encryption.

envelope encryption

For more details, see Protecting your data with envelope encryption - Standard Plan.

Try it out

Try out the service in the IBM Cloud: https://cloud.ibm.com/catalog/services/hyper-protect-crypto-services.

Follow the Getting started tutorial.

Explore the IBM Cloud Catalog

The IBM Cloud catalog includes hyper protect products.

cloud catalog

Reference