All hot private keys used for signing are stored on Hardware Security Modules (HSM).
Excessive signing increases your supply chain's attack surface. We help you sign only what matters.
Signing software means vouching for its integrity. We help you manage who has this authority.
All our devices are located in Sweden with Swedish made Hardware Security Modules.
There are scenarios when a Private Key needs to be handled in its raw unencrypted format. For example when creating a new key , provisioning a Hardware Security Module (HSM) or verifying the keys integrity. This needs to be done in a secure environment. Our Private Key Environment (PKE) is purpose-built to securely handle unencrypted private keys.
Devices in the PKE runs our custom Operating System PkOS which can be loaded from write protected physical media. This ensures all storage is volatile and there is no scenario where the unencrypted private key can be stored persistently.
All devices in our PKE are physically air gapped (MSB1309). Our bitfrost data diod ensures data from within the PKE cannot be leaked, while allowing software updates and security patches to be ingressed.
Implementing secure boot in hardware can be challenging, with complex documentation and the risk of damaging circuit boards during trial-and-error.
We guide you through the process, helping you avoid common pitfalls and secure your hardware effectively.
Accessing hardware keys from higher-level software like the OS is crucial. For instance, it enables verification of bootloader upgrades using hardware keys, ensuring Secure Boot systems will boot again.
Have questions or need more information? Reach out to us!
B1C7 05C6 B1BF 719C A5CD 6739 8BEE 8379 084B C511