Secure HSM Auditing at a Distance: Enabling Remote Oversight (G12d)
Hardware security modules (HSMs) are extensively used in manufacturing to protect the keys used for signing firmware and other artifacts intended for smart devices. A less frequently discussed but equally important feature of HSMs is their ability to provide cryptographically protected audit logs that track how keys under their protection are used.
This talk introduces techniques for delivering audit log information that can be trusted at a distance, eliminating the need for auditors to travel to the HSM’s location. These techniques are vital for protecting smart manufacturing processes at remote locations and ensuring the integrity of audit records.