Logging and Reporting
Luna PCIe HSM allows you to track and report all activity on your HSM to encourage responsibility, ensure accountability, and upkeep tight security.
Both Luna Network and PCIe HSMs come equipped with HSM-level audit logging via Audit role. See HSM-Level Audit Logging.
HSM-Level Audit Logging
Monitoring HSM activity is essential to maintaining a high level of security for the highly sensitive material on your HSM. Luna HSMs have logging and reporting abilities to support this. These features are implemented in the HSM firmware for maximum security.
Logging
Secure logging is done at the whole HSM level. The HSM stores a record of past operations that is suitable for security audit review. Audit logging sends HSM log event records to a secure database on the local file system, with cryptographic safeguards ensuring verifiability, continuity, and reliability of HSM event log files.
Each log entry indicates what event occurred when, and who initiated it. Critical events are logged automatically.
Audit Management
For circumstances that require more comprehensive review of events taking place on the HSM, an HSM-level Audit role (White PED key for PED-authenticated HSMs) can be used. Each HSM has a unique Audit role whose purpose is to manage audits and monitor HSM activity.
The Audit role is independent from the other roles on the HSM. Creating the Audit role does not require the presence of the HSM SO and if the Audit role is initialized, the HSM and partition administrators are prevented from working with the log files. Only the Auditor can add failures, successes, key usage, and other events to the HSM logging procedure.
Audit log integrity is ensured against altering log records. Separating logging and its role from other administrative roles protects critical information related to the operations of your HSM.
For detailed instructions on implementing audit logging, see Audit Logging.