Overview

  • Hardware security modules
  • Hosts keys and performs actions in a cluster of FIPS 140-2 level 3 certified devices
  • Compliance with hardware requirements
  • Keys bound to region—support for multi-region
  • Keys non-exportable
  • Tamper resistant, with evidence of tamper
  • Horizontal autoscaling

Graph View