YubiHSM 2’s ‘Bring Your Own Key’ is portable security for cloud

Creating a robust data encryption strategy in a multi-cloud environment can be challenging. Considerations like availability, fail-over, control, cost and compliance are crucial. For organizations that are encrypting data on-premises and considering moving data to the cloud, a typical approach is to use an on-premises Hardware Security Module (HSM) or a cloud-based HSM. However, acquiring and managing traditional on-premises HSMs can be costly and complex. The acquisition and overhead costs can be prohibitive for organizations that require on-prem HSMs for key generation and backup, and a low number of cryptographic operations per year. 

There are also challenges with cloud-based HSMs as they can lock you into a single cloud provider – thus moving security and control of an organization’s data to the provider. In turn, this makes it difficult and expensive to utilize the benefits of a multi-cloud environment – like decrypting and porting data to other cloud providers.

To address this and enable organizations to own multi-cloud encryption keys, Yubico will be introducing ‘Bring Your Own Key’ (BYOK) capabilities for YubiHSM 2. With this upcoming functionality, the world’s smallest hardware security module will enable organizations to securely and cost-effectively store and transfer data in a multi-cloud environment using an on-premises HSM for secure management of cryptographic credentials – at a fraction of the cost and size of traditional HSMs. These new YubiHSM 2 capabilities will provide a number of benefits to organizations including:

Enhanced data security in a multi-cloud environment

Organizations will be able to stay in control of the security of their data in the multi-cloud versus relying on cloud-based HSMs. Organizations will be able to securely generate and manage data encryption keys on-premise with YubiHSM 2. The low price point and nano form factor will enable easy and cost-effective data portability in multi-cloud environments.

Better control, portability and flexibility

Organizations will have the option of BYOK using the YubiHSM 2 for Amazon AWS, Microsoft Azure and Google Cloud in order to stay cloud agnostic. YubiHSM 2 meets standard BYOK requirements across these leading cloud providers, enabling greater security for organizations by having control over their data encryption keys – including the choice of where to store their data and master keys based on business needs and budgetary requirements.

Reduction of cost and maintenance requirements compared to traditional on-premises HSMs

The world’s smallest hardware security module will enable organizations to securely and cost-effectively store and transfer data in a multi-cloud environment using an on-premises HSM for secure management of cryptographic credentials, at a fraction of the cost and size of traditional HSMs.

Meet regulatory compliance

YubiHSM 2 helps organizations stay compliant with a better way to secure and trust credentials. In order to meet the highest security compliance, YubiHSM 2 is available in a FIPS 140-2 validated, Level 3 version.

YubiHSM 2 is a full-function, network accessible HSM with a rich cryptography suite, PKCS#11 interface, software development kit, and additional cryptographic tools. YubiHSM 2 is available in a nano form-factor that easily fits into a USB-A port on a server, offering a low-cost alternative to traditional HSM models. Organizations can choose to deploy a production and backup version of the YubiHSM 2 for business continuity purposes. There are two versions of the YubiHSM 2: a FIPS 140-2 validated, Level 3 version as well as the non-FIPS YubiHSM 2 which includes the new BYOK feature.

The YubiHSM 2 has an ecosystem of robust tools and libraries for simplified deployment for organizations for all sizes, and a cryptographic suite of the most well-known, secure, and widely used cryptographic algorithms for key generation, key storage, management, signing operations and more. 

To stay updated and for more information on the upcoming ‘Bring Your Own Key’ feature for YubiHSM 2, sign up here.

Attending AWS re:Invent this week? Be sure to stop by booth #1402 to discuss phishing-resistant MFA and learn how Yubico and AWS deliver trust at scale, as well as ask any questions about BYOK with YubiHSM 2 – register in advance for a consultation here.

Talk to our teamTalk to our team

Share this article:


  • Platform independent digital identity for all Many are understandably concerned that the great invention called the Internet, initially created by researchers for sharing information, has become a major threat to democracy, security and trust. The majority of these challenges are caused by stolen, misused or fake identities. To mitigate these risks, some claim that we have to choose between security, usability […]Read moreDigital IdentityEUDIFounderStina Ehrensvard
  • Q&A with Yubico’s CEO: Our move to the main Nasdaq market in StockholmAs 2024 draws to a close, it’s the perfect time to reflect on the incredible journey we’ve had this year and how it has shaped where we stand today as a company. To mark this moment, I sat down with our CEO, Mattias Danielsson, to look back on the milestones and achievements of 2024—culminating in […]Read moreCEOMattias Danielsson
  • Exploring DORA: A look at the next major EU mandateFinancial institutions have historically managed operational risk using capital allocation, but under EU Regulation 2022/2554 – also known as the Digital Operational Resilience Act (DORA) – the financial sector and associated entities in the European Economic Area (EEA) must also soon follow new rules. These new rules focus on the protection, detection, containment, and the […]Read moreDORAEU
  • Securing critical infrastructure from modern cyber threats with phishing-resistant authenticationAcross the globe, 2024 has seen a whirlwind of change. With ongoing wars, recent political change-ups and more, growth in data breaches targeting critical infrastructure continue to be on the rise. Critical infrastructure is integral to our everyday life – from the energy and natural resources powering our hospitals and providing clean drinking water, telco […]Read moreCISAcritical infrastructurezero trust