Back

Implement a hardware security module, as necessary.


CONTROL ID
12222
CONTROL TYPE
Systems Design, Build, and Implementation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Implement security controls when developing systems., CC ID: 06270

This Control has the following implementation support Control(s):
  • Require dual authentication when switching out of PCI mode in the hardware security module., CC ID: 12274
  • Include an indicator to designate when the hardware security module is in PCI mode., CC ID: 12273
  • Design the random number generator to generate random numbers that are unpredictable., CC ID: 12255
  • Design the hardware security module to enforce the separation between applications., CC ID: 12254
  • Protect sensitive data when transiting sensitive services in the hardware security module., CC ID: 12253
  • Design the hardware security module to automatically clear its internal buffers of sensitive information prior to reuse of the buffer., CC ID: 12233
  • Design the hardware security module to erase sensitive data when compromised., CC ID: 12275
  • Restrict key-usage information for cryptographic keys in the hardware security module., CC ID: 12232
  • Prevent cryptographic keys in the hardware security module from making unauthorized changes to data., CC ID: 12231
  • Include in the system documentation methodologies for authenticating the hardware security module., CC ID: 12258
  • Protect sensitive information within the hardware security module from unauthorized changes., CC ID: 12225
  • Prohibit sensitive functions from working outside of protected areas of the hardware security module., CC ID: 12224
  • Establish and maintain an acceptable use policy for the hardware security module., CC ID: 12247
  • Install secret information into the hardware security module during manufacturing., CC ID: 12249


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • A regulated institution would typically utilise tamper resistant devices to store and generate cryptographic keys, generate PINs and perform encryption and decryption. In most cases this would involve the use of Hardware Security Modules (HSMs) or similarly secured devices. These devices would be ap… (Attachment F ¶ 7, APRA Prudential Practice Guide 234: Management of security risk in information and information technology, APRA Prudential Practice Guide 234: Management of security risk in information and information technology)
  • use of physically and logically protected devices and environments to store and generate cryptographic keys, generate PINs and perform encryption and decryption. In most cases this would involve the use of Hardware Security Modules (HSMs) or similarly secured devices; (Attachment E 5(a)., APRA Prudential Practice Guide CPG 234 Information Security, June 2019)
  • Implement internal control, security and auditability measures during configuration, integration and maintenance of hardware and infrastructural software to protect resources and ensure availability and integrity. Responsibilities for using sensitive infrastructure components should be clearly defin… (AI3.2 Infrastructure Resource Protection and Availability, CobiT, Version 4.1)