{"id":2704,"date":"2020-12-08T13:16:00","date_gmt":"2020-12-08T13:16:00","guid":{"rendered":"http:\/\/10.24.225.70\/?p=2704"},"modified":"2026-04-09T12:34:02","modified_gmt":"2026-04-09T10:34:02","slug":"hsm-what-is-it-and-who-needs-one","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/hsm-what-is-it-and-who-needs-one\/","title":{"rendered":"HSM \u2013 What is it and who needs one?"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-1c95cc62 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns2704_a9028d-57\"><a class=\"kb-button kt-button button kb-btn2704_00eabc-97 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading2704_959bf9-6e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_959bf9-6e\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading2704_270071-34 animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_270071-34\">HSM \u2013 What is it and who needs one?<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tDec 08, 2020\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading2704_a83d6d-cc wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading2704_a83d6d-cc\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">2 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2704_d6b27e-25 size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"523\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-1024x523.png\" alt=\"Man leaning against a laptop showing the HSM flow\" class=\"kb-img wp-image-51087\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-1024x523.png 1024w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-300x153.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-768x392.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-1536x785.png 1536w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-2048x1046.png 2048w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-18x9.png 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2eeb7bfc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-101dgyu is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2704_da2d4d-5b wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_da2d4d-5b\">What is a HSM?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2704_133ff1-d6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_133ff1-d6\">HSM stands for Hardware Security Module, and is a very secure dedicated hardware for securely storing cryptographic keys.<\/p>\n\n\n\n<p class=\"kt-adv-heading2704_303fcb-c0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_303fcb-c0\">It can encrypt, decrypt, create, store and manage digital keys, and be used for signing and authentication. The purpose is to safeguard and protect sensitive data.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1ohnpuo is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2704_8c16a1-e9 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_8c16a1-e9\">Why do you need a HSM?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2704_e57007-96 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_e57007-96\">There are several reasons, but the main one is security, and security on all levels.<\/p>\n\n\n\n<p class=\"kt-adv-heading2704_5b7a97-59 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_5b7a97-59\">In industries like the payment industry where you handle card data, data has to be encrypted in order to comply with PCI DSS. Here, HSM is best practice and often a requirement. From a technical perspective, an HSM is a very secure way to store cryptographic keys.<\/p>\n\n\n\n<p class=\"kt-adv-heading2704_0cfb12-99 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_0cfb12-99\">The hardware is physically protected. You cannot break into it, and it detects and alerts you if something is wrong. If an HSM is stolen and gets switched off, the cryptographic keys can be automatically deleted from its memory.<\/p>\n\n\n\n<p class=\"kt-adv-heading2704_51ee00-40 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_51ee00-40\">Thus, it is a secure solution if you need to protect extremely sensitive information.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-z5dsnl is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2704_f12392-39 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_f12392-39\">What are the main benefits of using HSM?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2704_d4db77-86 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_d4db77-86\">Safety, simplicity and performance. An HSM securely protects your cryptographic keys while making them easily accessible from your applications. It also provides high availability and strong performance for cryptographic operations.<\/p>\n\n\n\n<p class=\"kt-adv-heading2704_268030-00 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_268030-00\">By using an HSM, you offload cryptographic processing from your servers. Encryption and key operations are handled by the HSM hardware instead of your application servers.<\/p>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2704_97ba75-76 size-medium_large\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"769\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-03-768x769.png\" alt=\"\" class=\"kb-img wp-image-51089\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-03-768x769.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-03-300x300.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-03-150x150.png 150w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-03-12x12.png 12w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-03.png 800w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-ulii2m is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2704_70cc4a-fc wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_70cc4a-fc\">Can\u2019t you just encrypt and decrypt without using an HSM?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2704_1b407f-1f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_1b407f-1f\">Yes, you can. However, the keys used for encryption are often generated and stored on the same device performing the encryption. This is rarely a secure approach. If the key is accessible via the computer network, the risk of it being found and stolen increases significantly. Once stolen, it can be used to decrypt and access sensitive data.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-ulii2m is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2704_8e4583-2e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_8e4583-2e\">What security requirements exist for HSMs?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2704_93a2f2-b8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_93a2f2-b8\">There are strict standards and certification processes for HSM units. One important standard is FIPS-140 (Federal Information Processing Standards), which defines security requirements for cryptographic hardware. The PCI Council has also published requirements specifically for HSM devices. Using an HSM acts as a strong security indicator for your organization. It signals to auditors and stakeholders that you take encryption and information security seriously.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-ce21vg is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading2704_8a7dbe-5d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_8a7dbe-5d\">What kind of companies benefit most from using an HSM?<\/h2>\n\n\n\n<p class=\"kt-adv-heading2704_3f11c6-4c wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading2704_3f11c6-4c\">Companies with strong IT security awareness and a need to encrypt, sign or verify data benefit the most. Organizations across many industries that handle extremely sensitive data need secure storage for cryptographic keys. Additionally, companies handling personal data under GDPR, where there are high requirements for privacy and secure data processing, can benefit greatly from using an HSM to protect encryption keys.<\/p>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image2704_002750-fa size-medium_large\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-01-768x768.png\" alt=\"\" class=\"kb-img wp-image-51090\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-01-768x768.png 768w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-01-300x300.png 300w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-01-150x150.png 150w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-01-12x12.png 12w, https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-01.png 800w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n<\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?<\/p>","protected":false},"author":2,"featured_media":51087,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":2,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[117,160],"class_list":["post-2704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-blog","tag-hsm"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HSM \u2013 What is it and who needs one? - Complior<\/title>\n<meta name=\"description\" content=\"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/hsm-what-is-it-and-who-needs-one\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HSM \u2013 What is it and who needs one? - Complior\" \/>\n<meta property=\"og:description\" content=\"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/hsm-what-is-it-and-who-needs-one\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-08T13:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-09T10:34:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2527\" \/>\n\t<meta property=\"og:image:height\" content=\"1291\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"HSM \u2013 What is it and who needs one?\",\"datePublished\":\"2020-12-08T13:16:00+00:00\",\"dateModified\":\"2026-04-09T10:34:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/\"},\"wordCount\":463,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/HSM-blog-04.png\",\"keywords\":[\"Blog\",\"HSM\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/\",\"name\":\"HSM \u2013 What is it and who needs one? - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/HSM-blog-04.png\",\"datePublished\":\"2020-12-08T13:16:00+00:00\",\"dateModified\":\"2026-04-09T10:34:02+00:00\",\"description\":\"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/HSM-blog-04.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/HSM-blog-04.png\",\"width\":2527,\"height\":1291,\"caption\":\"Man leaning against a laptop showing the HSM flow\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/hsm-what-is-it-and-who-needs-one\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HSM \u2013 What is it and who needs one?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HSM \u2013 What is it and who needs one? - Complior","description":"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/hsm-what-is-it-and-who-needs-one\/","og_locale":"en_GB","og_type":"article","og_title":"HSM \u2013 What is it and who needs one? - Complior","og_description":"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?","og_url":"https:\/\/complior.se\/en\/hsm-what-is-it-and-who-needs-one\/","og_site_name":"Complior","article_published_time":"2020-12-08T13:16:00+00:00","article_modified_time":"2026-04-09T10:34:02+00:00","og_image":[{"width":2527,"height":1291,"url":"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png","type":"image\/png"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#article","isPartOf":{"@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"HSM \u2013 What is it and who needs one?","datePublished":"2020-12-08T13:16:00+00:00","dateModified":"2026-04-09T10:34:02+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/"},"wordCount":463,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png","keywords":["Blog","HSM"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/","url":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/","name":"HSM \u2013 What is it and who needs one? - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png","datePublished":"2020-12-08T13:16:00+00:00","dateModified":"2026-04-09T10:34:02+00:00","description":"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?","breadcrumb":{"@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png","width":2527,"height":1291,"caption":"Man leaning against a laptop showing the HSM flow"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/hsm-what-is-it-and-who-needs-one\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"HSM \u2013 What is it and who needs one?"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04.png",2527,1291,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-150x150.png",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-300x153.png",300,153,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-768x392.png",768,392,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-1024x523.png",1024,523,true],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-1536x785.png",1536,785,true],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-2048x1046.png",2048,1046,true],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2020\/12\/HSM-blog-04-18x9.png",18,9,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"An HSM is said to provide the highest security possible, so what is a Hardware Security Module, what does it do and how is it used?","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=2704"}],"version-history":[{"count":9,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2704\/revisions"}],"predecessor-version":[{"id":80425,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/2704\/revisions\/80425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/51087"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=2704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=2704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=2704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}