Audit Logs Available for Luna Cloud HSM Services

Thales Data Protection on Demand now collects audit logs for Luna Cloud HSM Services using client version 10.2 and newer. Users can generate audit log files and retrieve signed URLs for access to the audit log files using the Audit Query API /v1/audit-log-exports endpoint. Audit logs provide a record of the outcome of an action by an actor on a resource. 

For more information about Audit Logging see About the Audit Log API

Additional Field is Being Made Mandatory for Service Creation using the API

The servicePlan field is being made mandatory for service creation when using the API, for example when using POST/service_instances or POST/services.

If you use the API to provision services, you will need to pass a value matching one of the plans listed in the Open Service Broker catalog. For Luna Cloud HSM services, you must pass "single_hsm". Failure to pass a valid plan will result in a 400 error.

See the Thales Documentation Portal for more information about available endpoints and fields.

Updated Luna Cloud HSM Service Firmware Versions in NA

The firmware versions for Luna Cloud HSM Services operating in NA environments have been updated. The current firmware version based on region and FIPS mode are as follows:

  • NA FIPS - 1.5
  • NA non-FIPS - 1.5
  • EU FIPS - 1.5
  • EU non-FIPS - 1.6 

FW 1.5 includes improvements to the Point to Point encryption service. FW 1.5 also includes the following bug fixes:

  • SH-4366 - The firmware can create but not import public+sensitive keys. You must specify both CKA_PRIVATE=1 and CKA_SENSITIVE=1 Key Attributes for all Generated, Derived and Unwrapped keys
  • SH-5322 - The firmware crashes when cancelling a multi-part operation. The firmware no longer crashes when cancelling a multi-part operation.
  • SH-5595 - Deriving x9.42 DH2 returns CKR_OBJECT_HANDLE_INVALID. Deriving x9.42 DH2 no longer returns CKR_OBJECT_HANDLE_INVALID

Updated Luna Cloud HSM Service Firmware Versions in EU

The firmware versions for Luna Cloud HSM Services operating in EU environments have been updated. The current firmware version based on region and FIPS mode are as follows:

  • NA FIPS - 1.4.0
  • NA non-FIPS - 1.4.2
  • EU FIPS - 1.5
  • EU non-FIPS - 1.6 

FW 1.5 includes improvements to the Point to Point encryption service. FW 1.5 also includes the following bug fixes:

  • SH-4366 - The firmware can create but not import public+sensitive keys. You must specify both CKA_PRIVATE=1 and CKA_SENSITIVE=1 Key Attributes for all Generated, Derived and Unwrapped keys
  • SH-5322 - The firmware crashes when cancelling a multi-part operation. The firmware no longer crashes when cancelling a multi-part operation.
  • SH-5595 - Deriving x9.42 DH2 returns CKR_OBJECT_HANDLE_INVALID. Deriving x9.42 DH2 no longer returns CKR_OBJECT_HANDLE_INVALID

FW 1.6 includes all of the improvements from FW1.5 and additional enhancements.

Updates to DPoD Platform

Additional Fields are now Mandatory for Tenant Registration

The following fields are now mandatory for tenant registration:

  • Address
  • City
  • ZIP Code
  • State/Province/Region*

* Mandatory if Country is set to United States, Canada, or Australia

Clone between PED Luna HSM and Luna Cloud HSM with Luna HSM Client 10.4.1

Version 10.4.1 of the Luna HSM client is now available for download from the Thales Customer Support Portal.  This client supports hybrid usage of both Luna Cloud HSM services and the Luna HSM product line, as detailed in the Luna Cloud HSM Client User Guide.

Added

  • Luna HSM Client 10.4.1 allows you to initialize a Luna Cloud HSM service using a domain secret imported from a red PED key. This allows you to clone objects between PED-authenticated Luna HSM partitions and Luna Cloud HSM enabling cloud backups and improving availability by adding Luna Cloud HSM to your HA groups. See Initializing a Luna Cloud HSM Service for more information.

Thales Luna Cloud HSM Available Through Google Cloud Marketplace

Added

The Thales Luna Cloud HSM service is now available through Google Cloud Marketplace. Provisioning a Luna Cloud HSM service through Google Cloud Marketplace automatically generates a Thales Data Protection on Demand (DPoD) tenant and registers the user as the primary tenant administrator. The DPoD tenant provides access to features such as reporting and user and account management.

See the Thales Luna Cloud HSM service and Thales Data Protection on Demand documentation for more information.

Luna Cloud HSM Service Rebranding

Changed

The following Luna Cloud HSM service names have been changed:

  • HSM on Demand is now Luna Cloud HSM
  • HSM on Demand for CyberArk is now Luna Cloud HSM for CyberArk
  • HSM on Demand for Digital Signing is now Luna Cloud HSM for Digital Signing
  • HSM on Demand for Hyperledger is now Luna Cloud HSM for Hyperledger 
  • HSM on Demand for Java Code Signer is now Luna Cloud HSM for Java Code Signer 
  • HSM on Demand for Microsoft ADCS is now Luna Cloud HSM for Microsoft ADCS 
  • HSM on Demand for Microsoft Authenticode is now Luna Cloud HSM for Microsoft Authenticode
  • HSM on Demand for Microsoft SQL Server is now Luna Cloud HSM for Microsoft SQL Server 
  • HSM on Demand for PKI Private Key Protection is now Luna Cloud HSM for PKI Private Key Protection 
  • HSMoD for Oracle TDE is now Luna Cloud HSM for Oracle TDE 
  • HSM on Demand with Key Export is now Luna Cloud HSM with Key Export

Partition Restoration

Added:

Thales Data Protection on Demand can support requests to restore a Luna Cloud HSM Service partition to a previous state. 

Partition snapshots are taken daily and stored for 7 days. A tenant administrator can submit a partition snapshot restore request to have a partition restored to a previous state. Users can request restoration of a partition to recover from catastrophic events such as accidental zeroization of the service partition. Partition rollbacks can take up to 48 hours to complete.

Restoring a partition will undo any changes made to the service partition since the backup date, this includes removing new objects from the service partition and resetting password changes. 

Please download and complete the Partition Snapshot Restoration Request Form and include it in your support request to Thales Customer Support Portal

See the Partition Snapshot Restoration Guide for more information.

Show Previous EntriesShow Previous Entries