Release notes for Hyper Protect Crypto Services
Stay up to date with the new features that are available for IBM Cloud® Hyper Protect Crypto Services.
18 July 2024
- Updated: Transition to VPC data centers in Dallas, Washington D.C, and Frankfurt
-
Hyper Protect Crypto Services will be transitioning out of IBM Cloud classic data centers in Dallas (
DAL
), Washington D.C (WDC
), and Frankfurt (FRA
) to IBM Cloud Virtual Private Cloud (VPC) data centers in those respective locations allowing you to take advantage of the new product features and capabilities that VPC offers.Implications for current users:
The transition to VPC data centers will be a service/technology upgrade with the user experience remaining unchanged. Minimal customer interaction is required to complete the transition. There is minimal impact to clients.
Support from the IBM Team is available to ensure the successful deployment of your instances in the VPC data centers, contact your local sales representative or send an email to zaas.client.acceleration@ibm.com for more information.
Key dates for this transition:
-
For existing instances in
DAL
andWDC
, customer migration will be August 22, 2024 – January 31, 2025. Support remains uninterrupted throughout migration process. After January 31, 2025, the services inDAL
andWDC
data centers will be decommissioned and no longer available. All non-migrated instances and existing data still present in theDAL
andWDC
data centers will be terminated after this date. -
For existing instances in
FRA
, customer migration will be August 15, 2024 – January 31, 2025. Support remains uninterrupted throughout migration process. After January 31, 2025, the services inFRA
data center will be decommissioned and no longer available. All non-migrated instances and existing data still present in theFRA
data center will be terminated after this date.
-
15 July 2024
- Updated: New API endpoints in Frankfurt
- If you create your instances in Frankfurt after July 15, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
2 July 2024
- Updated: New API endpoints in Madrid
- If you create your instances in Madrid after July 2, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
19 June 2024
- Updated: New API endpoints in Tokyo
- If you create your instances in Tokyo after June 19, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
5 June 2024
- Updated: New API endpoints in London
- If you create your instances in London after June 5, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
29 May 2024
- Updated: New API endpoints in Toronto
- If you create your instances in Toronto after May 29, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
15 May 2024
- Updated: New API endpoints in São-Paulo
- If you create your instances in São-Paulo after May 15, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
8 May 2024
- Updated: New API endpoints in Dallas
- If you create your instances in Dallas after May 8, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
12 April 2024
- Updated: New API endpoints in Washington DC
- If you create your instances in Washington DC after April 12, you need to use the new API endpoints for operations against your new instances. For more information about the supported regions and the new endpoint URLs, see New endpoints.
29 February 2024
- Added: New key state
pending destruction
- After you move a key from Deactivated to Destroyed state, the key will first be pending on destruction for a time period defined by the destruction policies of the external cloud providers. When the time period ends, the key will be moved to Destroyed state. For any pending destruction keys, a pending flag is displayed in the corresponding key card or the key list. For more information, see Monitoring the lifecycle of encryption keys in Unified Key Orchestrator.
- Added: Connecting to Azure Key Vault through private endpoint
- You can use Unified Key Orchestrator to connect to Azure Key Vault through the private endpoint with the UI, or programmatically with the Unified Key Orchestrator API. With establishing a private connection between Unified Key Orchestrator and Azure Key Vault, exposing your service to the public internet is no longer necessary. For more information, see Connecting to Azure Key Vault through private endpoint.
18 January 2024
- Added: Azure software-protected key support for IBM Cloud
- Besides HSM-protected keys, software-protected keys can now also be created in Azure Key Vault (Premium) keystores of Unified Key Orchestrator. However, you can still create and distribute only software-protected keys to Azure Key Vault (Standard). For more information, see Creating managed keys and Creating key templates.
09 November 2023
- Added: Hyper Protect Crypto Services adds support for Bring Your Own HSM (BYOHSM)
-
BYOHSM extends your local key management capability to the cloud and creates a scalable, unified, and secure hybrid cloud ecosystem for your regulated workloads. By connecting your own HSMs to your Hyper Protect Crypto Services instance, you have complete physical control over your keys to meet the data sovereignty regulations.
The following topics can help you get started with the BYOHSM function:
26 October 2023
- Deprecated: IBM Cloud Hyper Protect Crypto Services in Sydney
-
Hyper Protect Crypto Services and Hyper Protect Virtual Servers for Classic will be deprecated from the IBM Cloud data center in
Sydney
. New instances of Hyper Protect Services can no longer be deployed in the IBM Cloud data center inSydney
after 30 November 2023, and existing Hyper Protect services and support in the IBM Cloud data center in Sydney will be decommissioned and discontinued on 31 March 2024. -
This announcement does not impact any other services running in the IBM Cloud data center in Sydney, or any other Hyper Protect Services, including support, running in any other data centers where Hyper Protect is supported.
-
Review the following details for this deprecation:
- Effective 30 November 2023, no new instances of Hyper Protect Crypto Services or Hyper Protect Virtual Servers for Classic can be provisioned in
Sydney
. - Effective 31 March 2024, Hyper Protect Crypto Services and Hyper Protect Virtual Servers for Classic will no longer be supported, and the services will be decommissioned from the IBM Cloud data center in
Sydney
. It is recommended that all instances and data be migrated to an IBM Cloud VPC data center. - Any Hyper Protect Services instances and data still present in the IBM Cloud data center in
Sydney
will be stopped and terminated on this date. The data center infrastructure will be decommissioned and data and services no longer available. To avoid the risk of data loss, ensure a backup or transfer of any required data is taken before the service is decommissioned on 31 March 2024.
- Effective 30 November 2023, no new instances of Hyper Protect Crypto Services or Hyper Protect Virtual Servers for Classic can be provisioned in
-
For existing customers, migration to an IBM Cloud VPC data center is recommended:
- To continue using Hyper Protect Crypto Services, it is recommended to migrate to an IBM Cloud VPC data center. The recommended region for migration within APAC is
Tokyo
. - For Hyper Protect Virtual Servers for Classic instances, it is recommended to migrate to an IBM Cloud VPC data center, as well as deploy the latest version of the service, Hyper Protect Virtual Servers for VPC (Hyper Protect Virtual Servers for Classic is not available in IBM Cloud VPC data centers). The recommended region for migration within APAC is
Tokyo
. - To migrate to an IBM Cloud VPC Data center, support from IBM Team will be available. Contact your local sales representative or send an email to zaas.client.acceleration@ibm.com for more information.
- To continue using Hyper Protect Crypto Services, it is recommended to migrate to an IBM Cloud VPC data center. The recommended region for migration within APAC is
-
The following table lists the supported IBM Cloud VPC data centers for Hyper Protect Crypto Services and Hyper Protect Virtual Servers for Classic:
Table 1. Supported IBM Cloud VPC data centers Data center Hyper Protect Crypto Services Hyper Protect Virtual Servers for Classic Tokyo (Recommended region within APAC) jp-tok
São-Paulo br-sao
London eu-gb
Toronto ca-tor
Madrid eu-es
Washington DC us-east
N/A
22 Sept 2023
- Added: Hyper Protect Crypto Services expands into the Madrid region
- You can now create Hyper Protect Crypto Services instances in the Madrid (
eu-es
) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.
3 August 2023
- Added: Key template support for Unified Key Orchestrator
-
You are now able to create key templates which specify the properties of the managed keys to be created. After you create the key template, you can then create a group of managed keys with the same key properties that are defined in the key template.
The following topics can help you get started with key templates:
1 June 2023
- Updated: Pricing plan for Unified Key Orchestrator
-
The pricing plan has been updated for Unified Key Orchestrator. You can find more details on the service catalog page.
For a detailed pricing sample, see How am I charged for my use of Hyper Protect Crypto Services with Unified Key Orchestrator?.
24 May 2023
- Updated: Master key rotation support for all regions
-
You are now able to rotate master keys when you are using the Unified Key Orchestrator service plan or your service instance that has EP11 keystores enabled in all supported regions. Previously, it was only available in Frankfurt, Germany.
For a list of supported regions, see Regions and locations. For more information about how master key rotation works, see Master key rotation introduction.
24 March 2023
- Added: Master key rotation for Unified Key Orchestrator
- You can now rotate master keys on demand to meet industry standards and cryptographic best practices in your Hyper Protect Crypto Services with Unified Key Orchestrator instance. You can understand how keys are protected during master key rotation and use the UI to view the progress. For more information about how master key rotation works, see Master key rotation introduction.
- Added: Master key rotation for EP11 keystores
- You are now able to rotate master keys when your service instance has EP11 keystores enabled. Previously, this function is not available.
1 Feb 2023
- Added: Hyper Protect Crypto Services key management functions
-
The Hyper Protect Crypto Services key management service API is updated to version
22.11
. The following functions are added:- List Keys with sorting to include lastRotateDate sorting.
- List Keys with advanced filtering to including lastRotateDate filtering.
- Create key with policy overrides to enable users with Manager role to create keys with policies in a single call, overriding instance level policies.
- Disable a key rotation policy to allow an automatic key rotation policy to be paused temporarily.
- Added: Activity Tracker event names
-
Find the latest event names and mapping in Historical information regarding events.
19 December 2022
- Added: Managed key rotation support for Unified Key Orchestrator
- You can now manually rotate a managed key in your Hyper Protect Crypto Services with Unified Key Orchestrator instance. Managed key rotation shortens the cryptoperiod of the keys and reduces the probability for a security breach. For more information about how managed key rotation works, see Managed key rotation. For more information about the detailed instructions, see Rotating managed keys manually.
21 November 2022
- Added: Management Utilities support for Red Hat Enterprise Linux 9.0 and Ubuntu 22.04.1 LTS
-
To manage your master keys by using smart cards, you can now install the smart card reader driver Identiv SPR332 V2 on Red Hat Enterprise Linux 9.0 and Ubuntu 22.04.1 LTS besides the already supported Red Hat Enterprise Linux 8.0 operating system. For more detailed steps, see Installing the smart card reader driver.
You can also find the latest Management Utilities installation files in Github.
31 October 2022
- Added: Google Cloud KMS support
- You can now use Hyper Protect Crypto Services with Unified Key Orchestrator to create and manage Google Cloud KMS keys. For more information, see Connecting to external keystores and Creating managed keys.
20 October 2022
- Added: EP11 activity tracker events
- Both Hyper Protect Crypto Services Standard Plan and Hyper Protect Crypto Services with Unified Key Orchestrator now support Enterprise PKCS #11 (EP11) events tracking. You can use IBM Cloud Activity Tracker to monitor EP11 activities and analyze successful events. For more information, see Auditing events for Hyper Protect Crypto Services - Standard Plan and Auditing events for Hyper Protect Crypto Services with Unified Key Orchestrator.
24 June 2022
- Added: Go SDK and Terraform support for Unified Key Orchestrator
-
You can now manage your keys by using the Unified Key Orchestrator API with the Go software development kit (SDK) enabled. For more code examples in Go, see Unified Key Orchestrator API reference.
With the Terraform support for Unified Key Orchestrator, you can now automate actions, such as managing vaults, keystores, key templates, and keys, by using Terraform. For more information, see Setting up Terraform for Hyper Protect Crypto Services with Unified Key Orchestrator.
8 June 2022
- Added: Post-quantum cryptography support
- With the GREP11 API and the PKCS #11 API, you can now perform post-quantum cryptographic operations to protect your data against attacks from quantum computers. Currently, we support the Dilithium algorithm. For more information, see Post-quantum cryptography support in GREP11 and Post-quantum cryptography support in PKCS #11.
3 June 2022
- Added: Hyper Protect Crypto Services Unified Key Orchestrator CLI plug-in
- With the command-line interface (CLI) support for Hyper Protect Crypto Services with the Unified Key Orchestrator plan, you can now manage vaults, keystores, and keys by using CLI commands. For more information about these commands, see Unified Key Orchestrator CLI plug-in reference.
1 April 2022
- Updated: Pricing model of the Hyper Protect Crypto Services standard plan
-
The pricing model of the Hyper Protect Crypto Services standard plan is now changed from monthly billing to hourly billing with each crypto unit charged $2.13 USD per hour.
The first five keystores, including KMS key rings and EP11 keystores, are free of charge. Each additional key ring or EP11 keystore is charged with a tiered pricing starting at $225 USD per month. For keystores that are created or connected less than a month, the cost is prorated based on actual days within the month.
For more information, see the pricing plan. A billing example is also available for your reference.
- Updated: Process of ordering smart cards and smart card readers
-
To order smart cards and smart card readers, you can now email IBM at
zcat@ibm.com@ibm.com
and provide necessary information. For detailed steps, see Setting up smart cards and the Management Utilities.
25 March 2022
- Added: Hyper Protect Crypto Services expands into the Toronto region
- You can now create Hyper Protect Crypto Services instances in the Toronto (
ca-tor
) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.
22 March 2022
- General availability: Using Unified Key Orchestrator to manage and orchestrate keys in a multicloud environment
-
Unified Key Orchestrator is a public cloud control plane for multicloud and hybrid cloud key orchestration. As part of the IBM Cloud® Hyper Protect Crypto Services, it provides key lifecycle management according to NIST recommendations and secure transfer of keys to internal keystores in the service instance or external keystores.
With Unified Key Orchestrator, you can connect your service instance to keystores in IBM Cloud and third-party cloud providers, back up and manage keys by using a unified system, and orchestrate keys across multiple clouds.
The following topics can help you get started with Unified Key Orchestrator:
- Introducing Unified Key Orchestrator
- FAQs: Hyper Protect Crypto Services with Unified Key Orchestrator
- Getting started with Hyper Protect Crypto Services
- Monitoring the lifecycle of encryption keys in Unified Key Orchestrator
- Creating vaults
- Creating internal keystores
- Connecting to external keystores
- Creating and installing managed keys
28 February 2022
- Limited availability: Using Unified Key Orchestrator to manage and orchestrate keys in a multicloud environment
-
Unified Key Orchestrator is a public cloud control plane for multicloud and hybrid cloud key orchestration. As part of the IBM Cloud® Hyper Protect Crypto Services, it provides key lifecycle management according to NIST recommendations and secure transfer of keys to internal keystores in the service instance or external keystores.
With Unified Key Orchestrator, you can connect your service instance to keystores in IBM Cloud and third-party cloud providers, back up and manage keys by using a unified system, and orchestrate keys across multiple clouds.
The following topics can help you get started with Unified Key Orchestrator:
- Introducing Unified Key Orchestrator
- FAQs: Hyper Protect Crypto Services with Unified Key Orchestrator
- Getting started with Hyper Protect Crypto Services
- Monitoring the lifecycle of encryption keys in Unified Key Orchestrator
- Creating vaults
- Creating internal keystores
- Connecting to external keystores
- Creating and installing managed keys
23 February 2022
- Added: Using IBM Cloud Monitoring to measure Hyper Protect Crypto Services metrics
- By enabling metrics instance policy, you can now use IBM Cloud Monitoring to measure how users and applications interact with Hyper Protect Crypto Services. For more information, see Managing metrics and Monitoring operational metrics.
15 February 2022
- Added: Hyper Protect Crypto Services expands into the São-Paulo region
- You can now create Hyper Protect Crypto Services instances in the São-Paulo (
br-sao
) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.
21 January 2022
- Updated: Hyper Protect Crypto Services key management functions
- The Hyper Protect Crypto Services key management service API is updated to version
2.82
. The following functions are added:- Purge a deleted key: By default, a deleted key becomes purged automatically after 90 days of the deletion. Now you can manually purge a key to permanently remove the key from your instance before 90 days. After a key is deleted, there is a wait period of up to 4 hours before you can perform the action. Make sure that you are assigned the KMS Key Purge role before you purge a key. For more information, see Purging keys manually.
- Update the key ring of a key: After you create a key, you can move the key to a different key ring. For more information, see Transferring a key to a different key ring.
30 July 2021
- Added: Exclusive control on the execution of cryptographic operations
- To ensure the exclusive control on the execution of cryptographic operations, you can use the Hyper Protect Crypto Services certificate manager CLI to enable the second layer of authentication for EP11 (GREP11 or PKCS #11 API) connections. By enabling this function, you enable an extra layer of access control on top of the Identity and Access Management (IAM) token to the EP11 applications. A mutual TLS connection is established to ensure that only EP11 applications with a valid client certificate can perform EP11 operations. For more information, see Enabling the second layer of authentication for EP11 connections
- Added: Hyper Protect Crypto Services expands into the Tokyo region
- You can now create Hyper Protect Crypto Services instances in the Tokyo (
jp-tok
) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations. - Added: Using Terraform to initialize the Hyper Protect Crypto Services instance
- With the integration with Terraform, now you can initialize your service instance by using Terraform, and then automate actions by using Terraform. For more information, see Setting up Terraform for Hyper Protect Crypto Services and the Terraform documentation - Hyper Protect Crypto Services.
- Added: Using a signing service to manage signature keys for instance initialization
- If you are using Terraform or key part files to initialize a service instance, you can now choose to use a third-party signing service to create, store, and manage the administrator signature keys that are used by Terraform or the Trusted Key Entry (TKE) CLI plug-in. For more information, see Using a signing service to manage signature keys for instance initialization.
30 June 2021
- Added: Authenticated PKCS #11 keystore
- The PKCS #11 database-backed keystores can now be encrypted and authenticated. For each service instance, a maximum of five authenticated PKCS #11 keystores are supported. You can enable the
sessionauth
parameter to encrypt the generated keys into the keystore or to decrypt the key before you use it. For more information, see Set up the PKCS #11 configuration file. - Added: Enabling cross-region recovery with failover crypto units
- Failover crypto units back up the operational crypto units and keystores in another region. When a regional disaster occurs, you can use failover crypto units instead to reduce the downtime and data loss. Failover crypto units charge extra fees and this option is now available only in regions of
us-south
andus-east
. For more information, see Enabling or adding failover crypto units and Cross-region disaster recovery. - Added: Hyper Protect Crypto Services expands into the London region
- You can now create Hyper Protect Crypto Services instances in the London (
eu-gb
) region where the infrastructure is based on IBM Cloud Virtual Private Cloud (VPC). For more information, see Regions and locations.
30 April 2021
- Added: Rotating your master key by using smart cards and the Management Utilities
-
Besides rotating your master key using key part files and using recovery crypto units, you can now also rotate the master key if you are using smart cards and the Management Utilities.
For detailed instructions, see Rotating master keys by using smart cards and the Management Utilities. For more information about how master key rotation works, see Rotating master keys by using key part files.
- Updated: Restore key API and UI
-
Now you can restore keys that were deleted within 30 days without providing any key materials. All root keys and standard keys, whether generated by Hyper Protect Crypto Services or imported by you, can be restored. For more information, see Restoring keys.
31 March 2021
- Added: Grouping keys by using key rings
-
You can now group the keys in your Hyper Protect Crypto Services instance by creating a key ring. In this case, you can manage keys and control access at the key ring level. For how to use key rings, see Managing key rings.
- Added: Initializing the service instance by using recovery crypto units
-
Besides using smart cards and the Hyper Protect Crypto Services Management Utilities and using key part files, you can now also initialize your service instance by using recover crypto units in the Dallas (
us-south
) and Washington DC (us-east
) regions.When you provision a service instance in either of the Dallas or Washington DC region, two recovery units are automatically assigned without extra costs. A random master key value is automatically generated in a recovery crypto unit and copied to the other crypto units for the service instance. The master key value never appears in the clear outside of the HSMs.
For more information about the differences between the service instance initialization approaches, see Introducing service instance initialization approaches.
For detailed instructions, see Initializing service instances with recovery crypto units.
To rotate your master key, see Rotating master keys by using recovery crypto units.
- Added: Managing EP11 keystores and keys with the UI
-
Apart from using the PKCS #11 API to manage Enterprise PKCS #11 (EP11) keystores and keys, you can now use the UI to view, create, and delete EP11 keystores and keys. For more information, see Managing EP11 keystores with the UI and Managing EP11 keys with the UI.
- Added: Managing key aliases for a key
-
Key aliases are unique human-readable names that can be used to identify a key. You can now create up to five aliases for a key for easy recognition. For how to use key aliases, see Managing key aliases.
- Added: Synchronizing protected resources associated with root keys
-
When the state of a root key changes, the protected resources that are associated with the root key are notified of the key lifecycle event and are encouraged to respond accordingly. In the case where the resources do not respond to the key lifecycle notification, you can now manually initiate a renotification to those associated cloud services. For more information, see Synchronizing associated resources.
- Added: Using Virtual Private Endpoints for VPC
-
You can now create virtual private endpoints (VPEs) for your IBM Cloud Virtual Private Cloud (VPC) instance to access Hyper Protect Crypto Services within your VPC network. For more information, see Using a virtual private endpoint for VPC.
- Updated: The cryptography algorithm that is used to generate signature keys
-
The cryptography algorithm to generate signature keys is updated from Rivest-Shamir–Adleman 2048 (RSA 2048) to P521 Elliptic Curve (P521 EC). The cryptographic strength of P521 EC keys is equivalent to RSA 15360, which means the updated signature keys can provide the higher level of security comparing to the previous signature keys. The previous RSA 2048 signature keys are still valid and can be used.
28 February 2021
- Added: Key verification by using the PKCS #11 API
-
To ensure that no tampering has occurred to the keys that are stored in the Hyper Protect Crypto Services instance by using the PKCS #11 API, a key verification mechanism is now provided for you to check the key objects that are stored in Hyper Protect Crypto Services. For instructions on how to verify key objects, see Verifying that keys are protected by crypto units.
For an example of how to retrieve checksum values for AES, DES2, and DES3 keys along with the verification of the key checksums, see the code sample.
- Added: Support for the Schnorr algorithm
-
Hyper Protect Crypto Services now supports the Schnorr algorithm, which can be used as a signing scheme to generate digital signatures. It is proposed as an alternative algorithm to the Elliptic Curve Digital Signature Algorithm (ECDSA) for cryptographic signatures in the Bitcoin system. Before you can use the Schnorr algorithm, make sure to enable this feature by following the instructions in Enabling the Schnorr algorithm.
31 January 2021
- Added: Support for a single-tenant KMIP adapter
- Hyper Protect Crypto Services now provides a single tenant KMIP adapter to manage the key distribution in the vSphere or vSAN environment. For more information, see Configuring KMIP in Hyper Protect Crypto Services for key management and distribution.
31 December 2020
- Added: Managing the key create and import access policy
-
After you set up your Hyper Protect Crypto Services instance, you can enable and update the key create and import access policy to control actions permissions for root keys and standard keys. For more information, see Managing the key create and import access policy.
- Added: Provisioning and managing service instances with the private-only network
-
To achieve increased security, you can now limit the network access to your service instance to the private-only network. You can either choose the allowed network when you provision the service instance or update the network access policy after you set up the instance.
Before you update the network access policy, you need to initialize the service instance first. See Initializing service instances with the IBM Cloud TKE CLI plug-in or Initializing service instances by using smart cards and the Management Utilities for instructions.
- Added:
ReencryptSingle
function in GREP11 API -
The GREP11 API now supports the
ReencryptSingle
function, which enables you to decrypt data with the original key and then encrypt the raw data with a different key in a single call within the cloud HSM. This single call is a viable option where a large amount of data needs to be reencrypted with different keys, and bypasses the need to perform a combination ofDecryptSingle
andEncryptSingle
functions for each data item that needs to be reencrypted. For more information, see GREP11 API reference -ReencryptSingle
function. - Added: Support for accessing service instances through the Virtual Private Endpoint
-
You can now connect your IBM Cloud Virtual Private Cloud (VPC) instance to your Hyper Protect Crypto Services instance through a virtual private endpoint (VPE) gateway, so that you can manage your keys by using Hyper Protect Crypto Services through a private network. For more information, see Using virtual private endpoints for VPC to privately connect to Hyper Protect Crypto Services.
- Added: Support for the SLIP10 mechanism and Edwards-curve algorithm
-
Hyper Protect Crypto Services now supports the SLIP10 mechanism for hierarchical deterministic wallets to derive private and public key pairs. It now also supports the Edwards-curve (ED) 25519 algorithm for digital signatures. Before you can use the ED algorithm, make sure to enable this feature by following the instructions in Enabling Edwards-curve Digital Signature Algorithm.
- Added: Using Terraform to manage Hyper Protect Crypto Services instances and resources
-
Terraform is an open source software to configure and automate cloud resource provisioning and management. Now you can provision and initialize Hyper Protect Crypto Services instances, as well as managing root keys and standard keys with the Terraform CLI and the IBM Cloud Provider plug-in. For more information, see Managing key management service resources with Terraform and the sample Terraform template for Hyper Protect Crypto Services.
- Updated: key management service API
-
The Hyper Protect Crypto Services key management service API is updated with the following changes:
-
Updated: The API methods for the following key actions are now transferred to individual request paths. The generic path format (except the action of restoring a key) is
/api/v2/keys/<key_ID>/actions/<action>
wherekey_ID
is the UUID of the key andaction
is the action name that you want to execute. -
Updated: You can now use the following two methods to manage the allowed network policy and the key create and import access policy:
-
Deprecated: Invoke an action on a key.
This method is originally used for performing actions on a key, such as wrap, unwrap, and rotate. It is now replaced with individual request path for each action.
For more information about the API updates, see Hyper Protect Crypto Services key management service API reference.
-
30 November 2020
- Added: Support for the BIP32 mechanism
- Hyper Protect Crypto Services now supports the Bitcoin Improvement Proposal 0032 (BIP32) standard for hierarchical deterministic wallets to define how to derive private and public keys of a digital wallet. To enable BIP 32, follow the instructions in Enabling BIP32 deterministic wallets.
- Added: TKE activity tracker events
- Hyper Protect Crypto Services now supports the Trusted Key Entry (TKE) events auditing. You can now use IBM Cloud Activity Tracker to monitor TKE activities and analyze failed actions. For more information, see Auditing events for Hyper Protect Crypto Services.
30 September 2020
- Added: Master key rotation
-
You can now rotate your master key on demand by using the IBM Cloud® Trusted Key Entry CLI plug-in so as to meet industry standards and cryptographic best practices. For more information about how it works, see Master key rotation introduction.
For the detailed instructions, see Rotating master keys.
- Added: Support for performing cryptographic operations with the standard PKCS #11 API
-
Hyper Protect Crypto Services now supports performing cryptographic operations with the standard Public-Key Cryptography Standards (PKCS) #11 API.
With the support of PKCS #11 API, you don not need to change your existing applications that use PKCS #11 standard to make it run in the Hyper Protect Crypto Services cloud HSM environment. The PKCS #11 library accepts the PKCS #11 API requests from your applications and remotely accesses the cloud HSM to execute the corresponding cryptographic functions.
For more information about the PKCS #11 API use cases, see Using Hyper Protect Crypto Services as PKCS #11 HSMs.
To learn more about the PKCS #11 API, see Introducing PKCS #11 and PKCS #11 API reference.
31 August 2020
- Added: Support for import tokens to securely upload encryption keys
-
If you have Writer or Manager access permissions, you can now create import tokens to enable added security for encryption keys that you upload to Hyper Protect Crypto Services.
To find out more about your options for importing keys, check out Creating import tokens. For a guided tutorial, see Tutorial: Creating and importing encryption keys.
31 July 2020
- Added: Hyper Protect Crypto Services aligns the key management functions with Key Protect
-
Hyper Protect Crypto Services, built on FIPS 140-2 Level 4-compliant HSM, now supports the same level of key management functions as Key Protect. The added functions are as follows:
- Policy-based key rotation.
- Viewing root key versions.
- Disabling and enabling root keys.
- Dual authorization policies for Hyper Protect Crypto Services instances and keys.
- Viewing details about an encryption key.
- Viewing associations between root keys and IBM Cloud resources.
- Restoring a deleted key.
- Added: Hyper Protect Crypto Services expands into the Washington DC region
-
You can now create Hyper Protect Crypto Services resources in the Washington DC (US East) region. For more information, see Regions and locations.
30 June 2020
- Added: Support for quorum authentication
-
Both the IBM Cloud Trusted Key Entry (TKE) command-line interface (CLI) plug-in and the Hyper Protect Crypto Services Management Utilities now support quorum authentication.
Quorum authentication is the way to approve an operation by a set number of crypto unit administrators. Some sensitive operations require a sufficient number of crypto unit administrators to enter their credentials. Setting the signature thresholds to a value greater than one enables quorum authentication.
For more information about how to initialize a service instance by using the TKE CLI and enable quorum authentication, see Initializing service instances with the IBM Cloud TKE CLI plug-in.
For more information about how to initialize a service instance by using the Management Utilities and enable quorum authentication, see Setting up smart cards and the Management Utilities and Initializing service instances by using smart cards and the Management Utilities.
30 April 2020
- Added: Hyper Protect Crypto Services adds support for EP11 private endpoints
-
You can now connect to Hyper Protect Crypto Services over the IBM Cloud private network by targeting a private endpoint for the Enterprise PKCS #11 service.
To get started, enable virtual routing and forwarding (VRF) and service endpoints for your infrastructure account. For more information, see Using private endpoints.
- Added: Hyper Protect Crypto Services adds support for the Management Utilities
-
Hyper Protect Crypto Services now supports loading master key parts and signature keys from smart cards for service instance initialization. It ensures the highest level of protection for master key parts and signature keys.
The Management Utilities are two applications that use smart cards to configure service instances. The Smart Card Utility Program sets up and manages the smart cards used. The Trusted Key Entry (TKE) application uses those smart cards to configure service instances. To use the Management Utilities, you need to order IBM-supported smart cards and smart card readers.
For more information, see Understanding the Management Utilities and Initializing service instances by using smart cards and the Management Utilities.
- Updated: IBM Cloud service integration
-
Hyper Protect Crypto Services can now be integrated with more IBM Cloud services:
- Hyper Protect DBaaS for MongoDB
- Hyper Protect DBaaS for PostgreSQL
- HyTrust DataControl
- IBM Cloud Kubernetes Service
- Red Hat OpenShift on IBM Cloud
For more information, see Integrating services.
31 August 2019
- Added: Hyper Protect Crypto Services adds support for private endpoints
-
You can now connect to Hyper Protect Crypto Services over the IBM Cloud private network by targeting a private endpoint for the service.
To get started, enable virtual routing and forwarding (VRF) and service endpoints for your infrastructure account. For more information, see Using service endpoints to privately connect to Hyper Protect Crypto Services.
- Added: Hyper Protect Crypto Services Cloud HSM now supports EP11 cryptographic operations over gRPC
-
The managed Cloud Hardware Security Module (HSM) supports Enterprise Public-Key Cryptography Standards (PKCS) #11, so your applications can integrate cryptographic operations like digital signing and validation through Enterprise PKCS #11 (EP11) API. The EP11 library provides an interface similar to the industry-standard PKCS #11 API.
Hyper Protect Crypto Services provides a set of Enterprise PKCS #11 (EP11) over gRPC API calls (also referred to as GREP11), with which, all the Crypto functions are executed in HSM on cloud. GREP11 is a stateless interface for cloud programs.
For more information about the GREP11 API, see Introducing EP11 over gRPC and GREP11 API reference.
- Added: Hyper Protect Crypto Services expands into the Frankfurt region
-
You can now create Hyper Protect Crypto Services resources in the Frankfurt region. For more information, see Regions and locations.
- Added: IBM Cloud service integration
-
Hyper Protect Crypto Services can now be integrated with the following IBM Cloud services:
- IBM Cloud Object Storage
- IBM Cloud Block Storage for Classic for Virtual Private Cloud
- IBM Cloud Virtual Servers for Virtual Private Cloud
- Key Management Interoperability Protocol (KMIP) for VMware® on IBM Cloud
For more information, see Integrating services.
30 June 2019
- Added: Hyper Protect Crypto Services expands into Sydney region
- You can now create Hyper Protect Crypto Services resources in the Sydney region. For more information, see Regions and locations.
31 March 2019
- Hyper Protect Crypto Services is generally available
-
As of 29 March 2019, provisioning new Hyper Protect Crypto Services Beta instances will no longer be possible. Existing instances will have support until the End of Beta Support Date (30 April 2019).
For more information about the Hyper Protect Crypto Services offering, see the IBM Cloud Hyper Protect Crypto Services home page.
- High availability and disaster recovery
-
IBM Cloud Hyper Protect Crypto Services, which now supports three availability zones in a selected region, is a highly available service with automatic features that help keep your applications secure and operational.
You can create Hyper Protect Crypto Services resources in the supported IBM Cloud regions, which represent the geographic area where your Hyper Protect Crypto Services requests are handled and processed. Each IBM Cloud region contains multiple availability zones to meet local access, low latency, and security requirements for the region.
For more information, see High availability and disaster recovery.
- Scalability
-
The service instance can be scaled out to a maximum of six crypto units to meet your performance requirement. In a production environment, it is suggested to select at least two crypto units to enable high availability. By selecting three or more crypto units, these crypto units are distributed among three availability zones in the selected region.
Read Provisioning the service for more information.
28 February 2019
- Hyper Protect Crypto Services Beta is available
-
Hyper Protect Crypto Services Beta version is released. You can now access the Hyper Protect Crypto Services service through Catalog > Security directly.
As of 5 February 2019, provisioning new Hyper Protect Crypto Services Experimental instances will no longer be possible. Existing instances will have support until the End of Experimental Support Date (5 March 2019).
31 December 2018
- Added: Integration of Key Protect API
-
Key Protect API is now integrated with Hyper Protect Crypto Services to generate and protect your keys. You can call the Key Protect API directly through Hyper Protect Crypto Services.
For more information, see Setting up the key management service API and Hyper Protect Crypto Services key management service API reference.
- Added: Support for HSM management with Keep Your own Key
-
Hyper Protect Crypto Services now supports Keep Your Own Key (KYOK) so that you have more control and authority over your data with encryption keys that you can keep, control, and manage. You can initialize and manage your service instance with IBM Cloud® command-line interface (CLI).
For more information, see Initializing service instances to protect key storage.
- Deprecated: Function of accessing Hyper Protect Crypto Services through Advanced Cryptography Service Provider
-
At the current stage, accessing Hyper Protect Crypto Services through an Advanced Cryptography Service Provider (ACSP) client is being deprecated. If you are using a previous service instance, you can still use ACSP to explore Hyper Protect Crypto Services.