IBM Cloud Docs
Release notes for Hyper Protect Crypto Services

Release notes for Hyper Protect Crypto Services

Stay up to date with the new features that are available for IBM Cloud® Hyper Protect Crypto Services.

18 July 2024

Updated: Transition to VPC data centers in Dallas, Washington D.C, and Frankfurt

Hyper Protect Crypto Services will be transitioning out of IBM Cloud classic data centers in Dallas (DAL), Washington D.C (WDC), and Frankfurt (FRA) to IBM Cloud Virtual Private Cloud (VPC) data centers in those respective locations allowing you to take advantage of the new product features and capabilities that VPC offers.

Implications for current users:

The transition to VPC data centers will be a service/technology upgrade with the user experience remaining unchanged. Minimal customer interaction is required to complete the transition. There is minimal impact to clients.

Support from the IBM Team is available to ensure the successful deployment of your instances in the VPC data centers, contact your local sales representative or send an email to zaas.client.acceleration@ibm.com for more information.

Key dates for this transition:

  • For existing instances in DAL and WDC, customer migration will be August 22, 2024January 31, 2025. Support remains uninterrupted throughout migration process. After January 31, 2025, the services in DAL and WDC data centers will be decommissioned and no longer available. All non-migrated instances and existing data still present in the DAL and WDC data centers will be terminated after this date.

  • For existing instances in FRA, customer migration will be August 15, 2024January 31, 2025. Support remains uninterrupted throughout migration process. After January 31, 2025, the services in FRA data center will be decommissioned and no longer available. All non-migrated instances and existing data still present in the FRA data center will be terminated after this date.

15 July 2024

Updated: New API endpoints in Frankfurt
If you create your instances in Frankfurt after July 15, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

2 July 2024

Updated: New API endpoints in Madrid
If you create your instances in Madrid after July 2, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

19 June 2024

Updated: New API endpoints in Tokyo
If you create your instances in Tokyo after June 19, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

5 June 2024

Updated: New API endpoints in London
If you create your instances in London after June 5, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

29 May 2024

Updated: New API endpoints in Toronto
If you create your instances in Toronto after May 29, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

15 May 2024

Updated: New API endpoints in São-Paulo
If you create your instances in São-Paulo after May 15, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

8 May 2024

Updated: New API endpoints in Dallas
If you create your instances in Dallas after May 8, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

12 April 2024

Updated: New API endpoints in Washington DC
If you create your instances in Washington DC after April 12, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.

29 February 2024

Added: New key state pending destruction
After you move a key from Deactivated to Destroyed state, the key will first be pending on destruction for a time period defined by the destruction policies of the external cloud providers. When the time period ends, the key will be moved to Destroyed state. For any pending destruction keys, a pending flag is displayed in the corresponding key card or the key list. For more information, see Monitoring the lifecycle of encryption keys in Unified Key Orchestrator.
Added: Connecting to Azure Key Vault through private endpoint
You can use Unified Key Orchestrator to connect to Azure Key Vault through the private endpoint with the UI, or programmatically with the Unified Key Orchestrator API. With establishing a private connection between Unified Key Orchestrator and Azure Key Vault, exposing your service to the public internet is no longer necessary. For more information, see Connecting to Azure Key Vault through private endpoint.

18 January 2024

Added: Azure software-protected key support for IBM Cloud
Besides HSM-protected keys, software-protected keys can now also be created in Azure Key Vault (Premium) keystores of Unified Key Orchestrator. However, you can still create and distribute only software-protected keys to Azure Key Vault (Standard). For more information, see Creating managed keys and Creating key templates.

09 November 2023

Added: Hyper Protect Crypto Services adds support for Bring Your Own HSM (BYOHSM)

BYOHSM extends your local key management capability to the cloud and creates a scalable, unified, and secure hybrid cloud ecosystem for your regulated workloads. By connecting your own HSMs to your Hyper Protect Crypto Services instance, you have complete physical control over your keys to meet the data sovereignty regulations.

The following topics can help you get started with the BYOHSM function:

26 October 2023

Deprecated: IBM Cloud Hyper Protect Crypto Services in Sydney

Hyper Protect Crypto Services and Hyper Protect Virtual Servers for Classic will be deprecated from the IBM Cloud data center in Sydney. New instances of Hyper Protect Services can no longer be deployed in the IBM Cloud data center in Sydney after 30 November 2023, and existing Hyper Protect services and support in the IBM Cloud data center in Sydney will be decommissioned and discontinued on 31 March 2024.

This announcement does not impact any other services running in the IBM Cloud data center in Sydney, or any other Hyper Protect Services, including support, running in any other data centers where Hyper Protect is supported.

Review the following details for this deprecation:

  • Effective 30 November 2023, no new instances of Hyper Protect Crypto Services or Hyper Protect Virtual Servers for Classic can be provisioned in Sydney.
  • Effective 31 March 2024, Hyper Protect Crypto Services and Hyper Protect Virtual Servers for Classic will no longer be supported, and the services will be decommissioned from the IBM Cloud data center in Sydney. It is recommended that all instances and data be migrated to an IBM Cloud VPC data center.
  • Any Hyper Protect Services instances and data still present in the IBM Cloud data center in Sydney will be stopped and terminated on this date. The data center infrastructure will be decommissioned and data and services no longer available. To avoid the risk of data loss, ensure a backup or transfer of any required data is taken before the service is decommissioned on 31 March 2024.

For existing customers, migration to an IBM Cloud VPC data center is recommended:

  • To continue using Hyper Protect Crypto Services, it is recommended to migrate to an IBM Cloud VPC data center. The recommended region for migration within APAC is Tokyo.
  • For Hyper Protect Virtual Servers for Classic instances, it is recommended to migrate to an IBM Cloud VPC data center, as well as deploy the latest version of the service, Hyper Protect Virtual Servers for VPC (Hyper Protect Virtual Servers for Classic is not available in IBM Cloud VPC data centers). The recommended region for migration within APAC is Tokyo.
  • To migrate to an IBM Cloud VPC Data center, support from IBM Team will be available. Contact your local sales representative or send an email to zaas.client.acceleration@ibm.com for more information.

The following table lists the supported IBM Cloud VPC data centers for Hyper Protect Crypto Services and Hyper Protect Virtual Servers for Classic:

Table 1. Supported IBM Cloud VPC data centers
Data center Hyper Protect Crypto Services Hyper Protect Virtual Servers for Classic
Tokyo (Recommended region within APAC) jp-tok checkmark icon checkmark icon
São-Paulo br-sao checkmark icon checkmark icon
London eu-gb checkmark icon checkmark icon
Toronto ca-tor checkmark icon checkmark icon
Madrid eu-es checkmark icon checkmark icon
Washington DC us-east N/A checkmark icon

22 Sept 2023

Added: Hyper Protect Crypto Services expands into the Madrid region
You can now create Hyper Protect Crypto Services instances in the Madrid (eu-es) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.

3 August 2023

Added: Key template support for Unified Key Orchestrator

You are now able to create key templates which specify the properties of the managed keys to be created. After you create the key template, you can then create a group of managed keys with the same key properties that are defined in the key template.

The following topics can help you get started with key templates:

1 June 2023

Updated: Pricing plan for Unified Key Orchestrator

The pricing plan has been updated for Unified Key Orchestrator. You can find more details on the service catalog page.

For a detailed pricing sample, see How am I charged for my use of Hyper Protect Crypto Services with Unified Key Orchestrator?.

24 May 2023

Updated: Master key rotation support for all regions

You are now able to rotate master keys when you are using the Unified Key Orchestrator service plan or your service instance that has EP11 keystores enabled in all supported regions. Previously, it was only available in Frankfurt, Germany.

For a list of supported regions, see Regions and locations. For more information about how master key rotation works, see Master key rotation introduction.

24 March 2023

Added: Master key rotation for Unified Key Orchestrator
You can now rotate master keys on demand to meet industry standards and cryptographic best practices in your Hyper Protect Crypto Services with Unified Key Orchestrator instance. You can understand how keys are protected during master key rotation and use the UI to view the progress. For more information about how master key rotation works, see Master key rotation introduction.
Added: Master key rotation for EP11 keystores
You are now able to rotate master keys when your service instance has EP11 keystores enabled. Previously, this function is not available.

1 Feb 2023

Added: Hyper Protect Crypto Services key management functions

The Hyper Protect Crypto Services key management service API is updated to version 22.11. The following functions are added:

Added: Activity Tracker event names

Find the latest event names and mapping in Historical information regarding events.

19 December 2022

Added: Managed key rotation support for Unified Key Orchestrator
You can now manually rotate a managed key in your Hyper Protect Crypto Services with Unified Key Orchestrator instance. Managed key rotation shortens the cryptoperiod of the keys and reduces the probability for a security breach. For more information about how managed key rotation works, see Managed key rotation. For more information about the detailed instructions, see Rotating managed keys manually.

21 November 2022

Added: Management Utilities support for Red Hat Enterprise Linux 9.0 and Ubuntu 22.04.1 LTS

To manage your master keys by using smart cards, you can now install the smart card reader driver Identiv SPR332 V2 on Red Hat Enterprise Linux 9.0 and Ubuntu 22.04.1 LTS besides the already supported Red Hat Enterprise Linux 8.0 operating system. For more detailed steps, see Installing the smart card reader driver.

You can also find the latest Management Utilities installation files in Github.

31 October 2022

Added: Google Cloud KMS support
You can now use Hyper Protect Crypto Services with Unified Key Orchestrator to create and manage Google Cloud KMS keys. For more information, see Connecting to external keystores and Creating managed keys.

20 October 2022

Added: EP11 activity tracker events
Both Hyper Protect Crypto Services Standard Plan and Hyper Protect Crypto Services with Unified Key Orchestrator now support Enterprise PKCS #11 (EP11) events tracking. You can use IBM Cloud Activity Tracker to monitor EP11 activities and analyze successful events. For more information, see Auditing events for Hyper Protect Crypto Services - Standard Plan and Auditing events for Hyper Protect Crypto Services with Unified Key Orchestrator.

24 June 2022

Added: Go SDK and Terraform support for Unified Key Orchestrator

You can now manage your keys by using the Unified Key Orchestrator API with the Go software development kit (SDK) enabled. For more code examples in Go, see Unified Key Orchestrator API reference.

With the Terraform support for Unified Key Orchestrator, you can now automate actions, such as managing vaults, keystores, key templates, and keys, by using Terraform. For more information, see Setting up Terraform for Hyper Protect Crypto Services with Unified Key Orchestrator.

8 June 2022

Added: Post-quantum cryptography support
With the GREP11 API and the PKCS #11 API, you can now perform post-quantum cryptographic operations to protect your data against attacks from quantum computers. Currently, we support the Dilithium algorithm. For more information, see Post-quantum cryptography support in GREP11 and Post-quantum cryptography support in PKCS #11.

3 June 2022

Added: Hyper Protect Crypto Services Unified Key Orchestrator CLI plug-in
With the command-line interface (CLI) support for Hyper Protect Crypto Services with the Unified Key Orchestrator plan, you can now manage vaults, keystores, and keys by using CLI commands. For more information about these commands, see Unified Key Orchestrator CLI plug-in reference.

1 April 2022

Updated: Pricing model of the Hyper Protect Crypto Services standard plan

The pricing model of the Hyper Protect Crypto Services standard plan is now changed from monthly billing to hourly billing with each crypto unit charged $2.13 USD per hour.

The first five keystores, including KMS key rings and EP11 keystores, are free of charge. Each additional key ring or EP11 keystore is charged with a tiered pricing starting at $225 USD per month. For keystores that are created or connected less than a month, the cost is prorated based on actual days within the month.

For more information, see the pricing plan. A billing example is also available for your reference.

Updated: Process of ordering smart cards and smart card readers

To order smart cards and smart card readers, you can now email IBM at zcat@ibm.com@ibm.com and provide necessary information. For detailed steps, see Setting up smart cards and the Management Utilities.

25 March 2022

Added: Hyper Protect Crypto Services expands into the Toronto region
You can now create Hyper Protect Crypto Services instances in the Toronto (ca-tor) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.

22 March 2022

General availability: Using Unified Key Orchestrator to manage and orchestrate keys in a multicloud environment

Unified Key Orchestrator is a public cloud control plane for multicloud and hybrid cloud key orchestration. As part of the IBM Cloud® Hyper Protect Crypto Services, it provides key lifecycle management according to NIST recommendations and secure transfer of keys to internal keystores in the service instance or external keystores.

With Unified Key Orchestrator, you can connect your service instance to keystores in IBM Cloud and third-party cloud providers, back up and manage keys by using a unified system, and orchestrate keys across multiple clouds.

The following topics can help you get started with Unified Key Orchestrator:

28 February 2022

Limited availability: Using Unified Key Orchestrator to manage and orchestrate keys in a multicloud environment

Unified Key Orchestrator is a public cloud control plane for multicloud and hybrid cloud key orchestration. As part of the IBM Cloud® Hyper Protect Crypto Services, it provides key lifecycle management according to NIST recommendations and secure transfer of keys to internal keystores in the service instance or external keystores.

With Unified Key Orchestrator, you can connect your service instance to keystores in IBM Cloud and third-party cloud providers, back up and manage keys by using a unified system, and orchestrate keys across multiple clouds.

The following topics can help you get started with Unified Key Orchestrator:

23 February 2022

Added: Using IBM Cloud Monitoring to measure Hyper Protect Crypto Services metrics
By enabling metrics instance policy, you can now use IBM Cloud Monitoring to measure how users and applications interact with Hyper Protect Crypto Services. For more information, see Managing metrics and Monitoring operational metrics.

15 February 2022

Added: Hyper Protect Crypto Services expands into the São-Paulo region
You can now create Hyper Protect Crypto Services instances in the São-Paulo (br-sao) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.

21 January 2022

Updated: Hyper Protect Crypto Services key management functions
The Hyper Protect Crypto Services key management service API is updated to version 2.82. The following functions are added:
  1. Purge a deleted key: By default, a deleted key becomes purged automatically after 90 days of the deletion. Now you can manually purge a key to permanently remove the key from your instance before 90 days. After a key is deleted, there is a wait period of up to 4 hours before you can perform the action. Make sure that you are assigned the KMS Key Purge role before you purge a key. For more information, see Purging keys manually.
  2. Update the key ring of a key: After you create a key, you can move the key to a different key ring. For more information, see Transferring a key to a different key ring.

30 July 2021

Added: Exclusive control on the execution of cryptographic operations
To ensure the exclusive control on the execution of cryptographic operations, you can use the Hyper Protect Crypto Services certificate manager CLI to enable the second layer of authentication for EP11 (GREP11 or PKCS #11 API) connections. By enabling this function, you enable an extra layer of access control on top of the Identity and Access Management (IAM) token to the EP11 applications. A mutual TLS connection is established to ensure that only EP11 applications with a valid client certificate can perform EP11 operations. For more information, see Enabling the second layer of authentication for EP11 connections
Added: Hyper Protect Crypto Services expands into the Tokyo region
You can now create Hyper Protect Crypto Services instances in the Tokyo (jp-tok) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.
Added: Using Terraform to initialize the Hyper Protect Crypto Services instance
With the integration with Terraform, now you can initialize your service instance by using Terraform, and then automate actions by using Terraform. For more information, see Setting up Terraform for Hyper Protect Crypto Services and the Terraform documentation - Hyper Protect Crypto Services.
Added: Using a signing service to manage signature keys for instance initialization
If you are using Terraform or key part files to initialize a service instance, you can now choose to use a third-party signing service to create, store, and manage the administrator signature keys that are used by Terraform or the Trusted Key Entry (TKE) CLI plug-in. For more information, see Using a signing service to manage signature keys for instance initialization.

30 June 2021

Added: Authenticated PKCS #11 keystore
The PKCS #11 database-backed keystores can now be encrypted and authenticated. For each service instance, a maximum of five authenticated PKCS #11 keystores are supported. You can enable the sessionauth parameter to encrypt the generated keys into the keystore or to decrypt the key before you use it. For more information, see Set up the PKCS #11 configuration file.
Added: Enabling cross-region recovery with failover crypto units
Failover crypto units back up the operational crypto units and keystores in another region. When a regional disaster occurs, you can use failover crypto units instead to reduce the downtime and data loss. Failover crypto units charge extra fees and this option is now available only in regions of us-south and us-east. For more information, see Enabling or adding failover crypto units and Cross-region disaster recovery.
Added: Hyper Protect Crypto Services expands into the London region
You can now create Hyper Protect Crypto Services instances in the London (eu-gb) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.

30 April 2021

Added: Rotating your master key by using smart cards and the Management Utilities

Besides rotating your master key using key part files and using recovery crypto units, you can now also rotate the master key if you are using smart cards and the Management Utilities.

For detailed instructions, see Rotating master keys by using smart cards and the Management Utilities. For more information about how master key rotation works, see Rotating master keys by using key part files.

Updated: Restore key API and UI

Now you can restore keys that were deleted within 30 days without providing any key materials. All root keys and standard keys, whether generated by Hyper Protect Crypto Services or imported by you, can be restored. For more information, see Restoring keys.

31 March 2021

Added: Grouping keys by using key rings

You can now group the keys in your Hyper Protect Crypto Services instance by creating a key ring. In this case, you can manage keys and control access at the key ring level. For how to use key rings, see Managing key rings.

Added: Initializing the service instance by using recovery crypto units

Besides using smart cards and the Hyper Protect Crypto Services Management Utilities and using key part files, you can now also initialize your service instance by using recover crypto units in the Dallas (us-south) and Washington DC (us-east) regions.

When you provision a service instance in either of the Dallas or Washington DC region, two recovery units are automatically assigned without extra costs. A random master key value is automatically generated in a recovery crypto unit and copied to the other crypto units for the service instance. The master key value never appears in the clear outside of the HSMs.

For more information about the differences between the service instance initialization approaches, see Introducing service instance initialization approaches.

For detailed instructions, see Initializing service instances with recovery crypto units.

To rotate your master key, see Rotating master keys by using recovery crypto units.

Added: Managing EP11 keystores and keys with the UI

Apart from using the PKCS #11 API to manage Enterprise PKCS #11 (EP11) keystores and keys, you can now use the UI to view, create, and delete EP11 keystores and keys. For more information, see Managing EP11 keystores with the UI and Managing EP11 keys with the UI.

Added: Managing key aliases for a key

Key aliases are unique human-readable names that can be used to identify a key. You can now create up to five aliases for a key for easy recognition. For how to use key aliases, see Managing key aliases.

Added: Synchronizing protected resources associated with root keys

When the state of a root key changes, the protected resources that are associated with the root key are notified of the key lifecycle event and are encouraged to respond accordingly. In the case where the resources do not respond to the key lifecycle notification, you can now manually initiate a renotification to those associated cloud services. For more information, see Synchronizing associated resources.

Added: Using Virtual Private Endpoints for VPC

You can now create virtual private endpoints (VPEs) for your IBM Cloud Virtual Private Cloud (VPC) instance to access Hyper Protect Crypto Services within your VPC network. For more information, see Using a virtual private endpoint for VPC.

Updated: The cryptography algorithm that is used to generate signature keys

The cryptography algorithm to generate signature keys is updated from Rivest-Shamir–Adleman 2048 (RSA 2048) to P521 Elliptic Curve (P521 EC). The cryptographic strength of P521 EC keys is equivalent to RSA 15360, which means the updated signature keys can provide the higher level of security comparing to the previous signature keys. The previous RSA 2048 signature keys are still valid and can be used.

28 February 2021

Added: Key verification by using the PKCS #11 API

To ensure that no tampering has occurred to the keys that are stored in the Hyper Protect Crypto Services instance by using the PKCS #11 API, a key verification mechanism is now provided for you to check the key objects that are stored in Hyper Protect Crypto Services. For instructions on how to verify key objects, see Verifying that keys are protected by crypto units.

For an example of how to retrieve checksum values for AES, DES2, and DES3 keys along with the verification of the key checksums, see the code sample.

Added: Support for the Schnorr algorithm

Hyper Protect Crypto Services now supports the Schnorr algorithm, which can be used as a signing scheme to generate digital signatures. It is proposed as an alternative algorithm to the Elliptic Curve Digital Signature Algorithm (ECDSA) for cryptographic signatures in the Bitcoin system. Before you can use the Schnorr algorithm, make sure to enable this feature by following the instructions in Enabling the Schnorr algorithm.

31 January 2021

Added: Support for a single-tenant KMIP adapter
Hyper Protect Crypto Services now provides a single tenant KMIP adapter to manage the key distribution in the vSphere or vSAN environment. For more information, see Configuring KMIP in Hyper Protect Crypto Services for key management and distribution.

31 December 2020

Added: Managing the key create and import access policy

After you set up your Hyper Protect Crypto Services instance, you can enable and update the key create and import access policy to control actions permissions for root keys and standard keys. For more information, see Managing the key create and import access policy.

Added: Provisioning and managing service instances with the private-only network

To achieve increased security, you can now limit the network access to your service instance to the private-only network. You can either choose the allowed network when you provision the service instance or update the network access policy after you set up the instance.

Before you update the network access policy, you need to initialize the service instance first. See Initializing service instances with the IBM Cloud TKE CLI plug-in or Initializing service instances by using smart cards and the Management Utilities for instructions.

Added: ReencryptSingle function in GREP11 API

The GREP11 API now supports the ReencryptSingle function, which enables you to decrypt data with the original key and then encrypt the raw data with a different key in a single call within the cloud HSM. This single call is a viable option where a large amount of data needs to be reencrypted with different keys, and bypasses the need to perform a combination of DecryptSingle and EncryptSingle functions for each data item that needs to be reencrypted. For more information, see GREP11 API reference - ReencryptSingle function.

Added: Support for accessing service instances through the Virtual Private Endpoint

You can now connect your IBM Cloud Virtual Private Cloud (VPC) instance to your Hyper Protect Crypto Services instance through a virtual private endpoint (VPE) gateway, so that you can manage your keys by using Hyper Protect Crypto Services through a private network. For more information, see Using virtual private endpoints for VPC to privately connect to Hyper Protect Crypto Services.

Added: Support for the SLIP10 mechanism and Edwards-curve algorithm

Hyper Protect Crypto Services now supports the SLIP10 mechanism for hierarchical deterministic wallets to derive private and public key pairs. It now also supports the Edwards-curve (ED) 25519 algorithm for digital signatures. Before you can use the ED algorithm, make sure to enable this feature by following the instructions in Enabling Edwards-curve Digital Signature Algorithm.

Added: Using Terraform to manage Hyper Protect Crypto Services instances and resources

Terraform is an open source software to configure and automate cloud resource provisioning and management. Now you can provision and initialize Hyper Protect Crypto Services instances, as well as managing root keys and standard keys with the Terraform CLI and the IBM Cloud Provider plug-in. For more information, see Managing key management service resources with Terraform and the sample Terraform template for Hyper Protect Crypto Services.

Updated: key management service API

The Hyper Protect Crypto Services key management service API is updated with the following changes:

For more information about the API updates, see Hyper Protect Crypto Services key management service API reference.

30 November 2020

Added: Support for the BIP32 mechanism
Hyper Protect Crypto Services now supports the Bitcoin Improvement Proposal 0032 (BIP32) standard for hierarchical deterministic wallets to define how to derive private and public keys of a digital wallet. To enable BIP 32, follow the instructions in Enabling BIP32 deterministic wallets.
Added: TKE activity tracker events
Hyper Protect Crypto Services now supports the Trusted Key Entry (TKE) events auditing. You can now use IBM Cloud Activity Tracker to monitor TKE activities and analyze failed actions. For more information, see Auditing events for Hyper Protect Crypto Services.

30 September 2020

Added: Master key rotation

You can now rotate your master key on demand by using the IBM Cloud® Trusted Key Entry CLI plug-in so as to meet industry standards and cryptographic best practices. For more information about how it works, see Master key rotation introduction.

For the detailed instructions, see Rotating master keys.

Added: Support for performing cryptographic operations with the standard PKCS #11 API

Hyper Protect Crypto Services now supports performing cryptographic operations with the standard Public-Key Cryptography Standards (PKCS) #11 API.

With the support of PKCS #11 API, you don not need to change your existing applications that use PKCS #11 standard to make it run in the Hyper Protect Crypto Services cloud HSM environment. The PKCS #11 library accepts the PKCS #11 API requests from your applications and remotely accesses the cloud HSM to execute the corresponding cryptographic functions.

For more information about the PKCS #11 API use cases, see Using Hyper Protect Crypto Services as PKCS #11 HSMs.

To learn more about the PKCS #11 API, see Introducing PKCS #11 and PKCS #11 API reference.

31 August 2020

Added: Support for import tokens to securely upload encryption keys

If you have Writer or Manager access permissions, you can now create import tokens to enable added security for encryption keys that you upload to Hyper Protect Crypto Services.

To find out more about your options for importing keys, check out Creating import tokens. For a guided tutorial, see Tutorial: Creating and importing encryption keys.

31 July 2020

Added: Hyper Protect Crypto Services aligns the key management functions with Key Protect

Hyper Protect Crypto Services, built on FIPS 140-2 Level 4-compliant HSM, now supports the same level of key management functions as Key Protect. The added functions are as follows:

Added: Hyper Protect Crypto Services expands into the Washington DC region

You can now create Hyper Protect Crypto Services resources in the Washington DC (US East) region. For more information, see Regions and locations.

30 June 2020

Added: Support for quorum authentication

Both the IBM Cloud Trusted Key Entry (TKE) command-line interface (CLI) plug-in and the Hyper Protect Crypto Services Management Utilities now support quorum authentication.

Quorum authentication is the way to approve an operation by a set number of crypto unit administrators. Some sensitive operations require a sufficient number of crypto unit administrators to enter their credentials. Setting the signature thresholds to a value greater than one enables quorum authentication.

For more information about how to initialize a service instance by using the TKE CLI and enable quorum authentication, see Initializing service instances with the IBM Cloud TKE CLI plug-in.

For more information about how to initialize a service instance by using the Management Utilities and enable quorum authentication, see Setting up smart cards and the Management Utilities and Initializing service instances by using smart cards and the Management Utilities.

30 April 2020

Added: Hyper Protect Crypto Services adds support for EP11 private endpoints

You can now connect to Hyper Protect Crypto Services over the IBM Cloud private network by targeting a private endpoint for the Enterprise PKCS #11 service.

To get started, enable virtual routing and forwarding (VRF) and service endpoints for your infrastructure account. For more information, see Using private endpoints.

Added: Hyper Protect Crypto Services adds support for the Management Utilities

Hyper Protect Crypto Services now supports loading master key parts and signature keys from smart cards for service instance initialization. It ensures the highest level of protection for master key parts and signature keys.

The Management Utilities are two applications that use smart cards to configure service instances. The Smart Card Utility Program sets up and manages the smart cards used. The Trusted Key Entry (TKE) application uses those smart cards to configure service instances. To use the Management Utilities, you need to order IBM-supported smart cards and smart card readers.

For more information, see Understanding the Management Utilities and Initializing service instances by using smart cards and the Management Utilities.

Updated: IBM Cloud service integration

Hyper Protect Crypto Services can now be integrated with more IBM Cloud services:

  • Hyper Protect DBaaS for MongoDB
  • Hyper Protect DBaaS for PostgreSQL
  • HyTrust DataControl
  • IBM Cloud Kubernetes Service
  • Red Hat OpenShift on IBM Cloud

For more information, see Integrating services.

31 August 2019

Added: Hyper Protect Crypto Services adds support for private endpoints

You can now connect to Hyper Protect Crypto Services over the IBM Cloud private network by targeting a private endpoint for the service.

To get started, enable virtual routing and forwarding (VRF) and service endpoints for your infrastructure account. For more information, see Using service endpoints to privately connect to Hyper Protect Crypto Services.

Added: Hyper Protect Crypto Services Cloud HSM now supports EP11 cryptographic operations over gRPC

The managed Cloud Hardware Security Module (HSM) supports Enterprise Public-Key Cryptography Standards (PKCS) #11, so your applications can integrate cryptographic operations like digital signing and validation through Enterprise PKCS #11 (EP11) API. The EP11 library provides an interface similar to the industry-standard PKCS #11 API.

Hyper Protect Crypto Services provides a set of Enterprise PKCS #11 (EP11) over gRPC API calls (also referred to as GREP11), with which, all the Crypto functions are executed in HSM on cloud. GREP11 is a stateless interface for cloud programs.

For more information about the GREP11 API, see Introducing EP11 over gRPC and GREP11 API reference.

Added: Hyper Protect Crypto Services expands into the Frankfurt region

You can now create Hyper Protect Crypto Services resources in the Frankfurt region. For more information, see Regions and locations.

Added: IBM Cloud service integration

Hyper Protect Crypto Services can now be integrated with the following IBM Cloud services:

  • IBM Cloud Object Storage
  • IBM Cloud Block Storage for Classic for Virtual Private Cloud
  • IBM Cloud Virtual Servers for Virtual Private Cloud
  • Key Management Interoperability Protocol (KMIP) for VMware® on IBM Cloud

For more information, see Integrating services.

30 June 2019

Added: Hyper Protect Crypto Services expands into Sydney region
You can now create Hyper Protect Crypto Services resources in the Sydney region. For more information, see Regions and locations.

31 March 2019

Hyper Protect Crypto Services is generally available

As of 29 March 2019, provisioning new Hyper Protect Crypto Services Beta instances will no longer be possible. Existing instances will have support until the End of Beta Support Date (30 April 2019).

For more information about the Hyper Protect Crypto Services offering, see the IBM Cloud Hyper Protect Crypto Services home page.

High availability and disaster recovery

IBM Cloud Hyper Protect Crypto Services, which now supports three availability zones in a selected region, is a highly available service with automatic features that help keep your applications secure and operational.

You can create Hyper Protect Crypto Services resources in the supported IBM Cloud regions, which represent the geographic area where your Hyper Protect Crypto Services requests are handled and processed. Each IBM Cloud region contains multiple availability zones to meet local access, low latency, and security requirements for the region.

For more information, see High availability and disaster recovery.

Scalability

The service instance can be scaled out to a maximum of six crypto units to meet your performance requirement. In a production environment, it is suggested to select at least two crypto units to enable high availability. By selecting three or more crypto units, these crypto units are distributed among three availability zones in the selected region.

Read Provisioning the service for more information.

28 February 2019

Hyper Protect Crypto Services Beta is available

Hyper Protect Crypto Services Beta version is released. You can now access the Hyper Protect Crypto Services service through Catalog > Security directly.

As of 5 February 2019, provisioning new Hyper Protect Crypto Services Experimental instances will no longer be possible. Existing instances will have support until the End of Experimental Support Date (5 March 2019).

31 December 2018

Added: Integration of Key Protect API

Key Protect API is now integrated with Hyper Protect Crypto Services to generate and protect your keys. You can call the Key Protect API directly through Hyper Protect Crypto Services.

For more information, see Setting up the key management service API and Hyper Protect Crypto Services key management service API reference.

Added: Support for HSM management with Keep Your own Key

Hyper Protect Crypto Services now supports Keep Your Own Key (KYOK) so that you have more control and authority over your data with encryption keys that you can keep, control, and manage. You can initialize and manage your service instance with IBM Cloud® command-line interface (CLI).

For more information, see Initializing service instances to protect key storage.

Deprecated: Function of accessing Hyper Protect Crypto Services through Advanced Cryptography Service Provider

At the current stage, accessing Hyper Protect Crypto Services through an Advanced Cryptography Service Provider (ACSP) client is being deprecated. If you are using a previous service instance, you can still use ACSP to explore Hyper Protect Crypto Services.