Zero-trust MySQL reference with TLS 1.3 mTLS, client-side AES-GCM via HSM KMS, tenant isolation, tamper-evident audit, and automated proof-of-controls.
-
Updated
Dec 15, 2025 - Shell
Zero-trust MySQL reference with TLS 1.3 mTLS, client-side AES-GCM via HSM KMS, tenant isolation, tamper-evident audit, and automated proof-of-controls.
PKCS#11 sidecar container for Securosys Primus HSM.
A small shell script for gathering metrics from tape drives inside libraries such as the IBM TS4500. The collected information can be used by Prometheus for monitoring and alerting.
A minimalistic distributed file signing system with Authenticode and PKCS#11 support.
Key Vault integration with API Management so that secrets and certificates are stored in a FIPS 140-2 Level 2 compliant HSM.
Running Rust code on nCipher HSMs (using CodeSafe).
A small subset of the submitted sample data from https://github.com/GrapheneOS/Auditor. It has a sample attestation certificate chain per device model (ro.product.model) along with a subset of the system properties from the sample as supplementary information.
Add a description, image, and links to the hsm topic page so that developers can more easily learn about it.
To associate your repository with the hsm topic, visit your repo's landing page and select "manage topics."