Home >

Comparison of destruction/denial actions

Comparison Summary

Various operations on the Luna PCI-E HSM are intended to make HSM contents unavailable to potential intruders. The effect of those actions are summarized and contrasted in the following table.

Event

MTK is destroyed

(inside a specialized integrated circuit called the 3120)

HSM is unavailable, but
use/access can be recovered
after reboot

KEK is destroyed
(Real-Time Clock and NVRAM)

HSM contents can
never be recovered
(unless you have a
backup)

- three bad HSM Adminstrator / SO login attempts
or

 - lunash:> hsm factoryReset

NO YES
- hardware tamper
 or
- lunacm:> srk transport
YES NO
decommission (*)
NO YES

(*) Decommission means electrically bridging the decommission header pins on the Luna PCI-E card - normally this would be used only if you installed the HSM in a server that brought the electrical connection of those pins out to an external momentary-contact switch (as is done on Luna SA).

In addition, another event/action that has a destructive component is HSM initialization, which can be of either the "soft" or "hard" variety. Init is soft if you have not performed an hsm factoryReset before hsm init. Init is hard if it is performed following hsm factoryReset. Effects of soft versus hard initializations are summarized below - either way, HSM and partition objects are gone:

Condition/Effect

Soft init

Hard init 

 SO authentication required?   Yes  No
 Can set new HSM label   Yes  Yes
 Creates new SO identity   No  Yes
 Creates new Domain   No  Yes
 Destroys partitions   Yes  No (none exist to destroy) *
 Destroys SO objects   Yes  No (none exist to destroy) *

* hsm factoryReset was performed, and destroyed partitions and objects, before the hard init... otherwise, it could not be a hard init.