Bookmarks Use Case Concepts Monitoring Pricing A computing device that enables you to provision and manage your own single-tenant HSMs for the generation and use of encryption keys. A hardware security module (HSM) performs cryptographic operations and provides secure storage for cryptographic keys. You can perform the following cryptographic tasks: Generate, store, import, export, and manage cryptographic keys. Use symmetric and asymmetric algorithms to encrypt and decrypt your data. Compute message digests and hash-based message authentication codes using cryptographic hash functions. Cryptographically sign data and verify signatures. You can generate cryptographically secure random [...]