Product Advantages
-
DEW provides KMS, integrated with many of the Huawei Cloud extensive services including Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), and more.
DEW provides KMS, integrated with many of the Huawei Cloud extensive services including Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), and more.
-
DEW provides CSCA certified or FIPS 140-2 validated level-3 HSM protection, guaranteeing high-performance encryption to meet your strict security requirements.
DEW provides CSCA certified or FIPS 140-2 validated level-3 HSM protection, guaranteeing high-performance encryption to meet your strict security requirements.
-
With DEW, keys and random numbers are generated by the third-party validated HSMs. It is compliant with local and international laws and regulations.
With DEW, keys and random numbers are generated by the third-party validated HSMs. It is compliant with local and international laws and regulations.
Application Scenarios
Dedicated HSM
For encryption scenarios requiring strict compliance, you can use the FIPS 140-2 validated level-3 HSM to implement dedicated encryption.
Advantages
Functions
-
Uses Hardware Security Modules (HSMs) to protect your keys. It seamlessly interworks with other cloud services to protect service data and can be used to develop encryption applications.
Uses Hardware Security Modules (HSMs) to protect your keys. It seamlessly interworks with other cloud services to protect service data and can be used to develop encryption applications.
-
Caters to diverse encryption needs with high security and compliance.
Caters to diverse encryption needs with high security and compliance.
-
You can use keys imported from offline or created on the KMS console, where you can enable, disable, or delete them as needed. Default keys are also listed on the console for convenient, centralized management.
You can use keys imported from offline or created on the KMS console, where you can enable, disable, or delete them as needed. Default keys are also listed on the console for convenient, centralized management.
-
Dedicated HSM supports a range of cryptographic algorithms, including RSA, DSA, and ECDSA. It also provides industry-standard and application-integrated APIs, such as PKCS #11, JCE, CNG, and more. You can use dedicated subracks, power supply, bandwidth, and interfaces, meeting strict security requirements.
Dedicated HSM supports a range of cryptographic algorithms, including RSA, DSA, and ECDSA. It also provides industry-standard and application-integrated APIs, such as PKCS #11, JCE, CNG, and more. You can use dedicated subracks, power supply, bandwidth, and interfaces, meeting strict security requirements.