[Cryptech Tech] arm
Peter Gutmann
pgut001 at cs.auckland.ac.nz
Tue Jan 20 08:10:08 UTC 2015
Jakob Schlyter <jakob at kirei.se> writes:
>Would you consider that bridge to be inside or outside the security boundary
>of the HSM?
That depends on what you call the "security boundary" (and what you're trying
to do by asking that question). I would consider it as a firewall, it's
taking a not-necessarily-trustworthy component and isolating it to reduce the
amount of access it has to HSM critical components.
Peter.
More information about the Tech
mailing list