You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
KBS is not close to FIPS 140-3 level 1 (software module) nor is it aligned with the relevant protection profiles for HSMs (including soft HSMs).
It is not well suited for a system of system attestation.
It’s not compliant with KMIP either
Does not plug into OSCP
Handling of the RIM database
Customizable attestation policies
Sealed secrets
No authorization for resource retrieval (There should be authorization policies so users can only retrieve their own resources)
No authentication for resource retrieval
Designed for just one project or single build (multi-project or mult-build or namespace separation)
There is only one resource policy. If two projects both set up different resource policies, the new policy can overwritten the previous one
Resource identification only by path
High availability/Scalabitly
HSM requirements / PKCS#11 ?
Rate limitation to other services like AMD KDS, caching service?
Should an OTS solution like Vault be preferred? (or a cloud HSM so long as you’re not single infrastructure vendor) and Trustee brokers it to the backend?
Here is a list of things Trustee doesn't do:
Should an OTS solution like Vault be preferred? (or a cloud HSM so long as you’re not single infrastructure vendor) and Trustee brokers it to the backend?