CloudHSM Support on Prisma Access
Focus
Focus
What's New in the NetSec Platform

CloudHSM Support on Prisma Access

Table of Contents

CloudHSM Support on Prisma Access

CloudHSM support for Prisma Access
Do your security and compliance requirements prevent you from storing Transport Layer Security (TLS) private keys directly on your Prisma® Access service infrastructure for SSL decryption? This feature allows you to integrate with AWS CloudHSM or an on-premises hardware security module (HSM) solution to store and manage the issuing Certificate Authority (CA) private keys externally, enhancing the security of your cryptographic operations. The SSL decryption functionality on Prisma Access mandates that you bring your own public key infrastructure (PKI) to the platform or create a new self-signed PKI within Prisma Access. This feature requires an issuing CA or forward trust certificate (consisting of public and private keys) to generate new certificates for visited sites and domains. Prisma Access requires that all cryptographic secrets, including the TLS certificate private keys needed for SSL decryption, are stored inside the configuration file that resides on the Prisma Access service infrastructure and on each SPN that is part of the tenant. Some Prisma Access customers prefer not to provide the TLS private keys on PA infrastructure or reside on PA SPNs for SSL decryption operations (security and compliance requirements).