{"id":50750,"date":"2026-04-30T11:00:00","date_gmt":"2026-04-30T18:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/en-us\/blog\/?p=50750"},"modified":"2026-04-30T12:35:59","modified_gmt":"2026-04-30T19:35:59","slug":"enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/","title":{"rendered":"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">As cloud workloads become more agentic and AI systems increasingly handle mission\u2011critical data, trust must be engineered into the infrastructure at every layer. At Microsoft, security is designed into the foundation of our cloud infrastructure, from silicon to services. With the Azure Integrated Hardware Security Module (HSM), Microsoft is redefining how cryptographic trust is delivered in the cloud.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Integrated HSM is a tamper\u2011resistant, Microsoft\u2011built hardware security module integrated into every new Azure server, extending existing key management services by bringing hardware enforced protection directly to where workloads execute. Rather than relying solely on centralized services, this approach makes hardware-backed security a native property of the compute platform itself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Integrated HSM is engineered to meet <a href=\"https:\/\/csrc.nist.gov\/Projects\/cryptographic-module-validation-program\/modules-in-process\/modules-in-process-list\" target=\"_blank\" rel=\"noreferrer noopener\">FIPS 140\u20113 Level 3<\/a>, the gold standard for hardware security modules used by governments and regulated industries worldwide. Level 3 requires strong tamper resistance, hardware-enforced isolation, and protection against physical and logical key extraction. By building these assurances directly into the platform, Azure makes the highest levels of compliance a default property of the cloud, rather than a specialized configuration or premium add\u2011on.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/learn.microsoft.com\/en-gb\/azure\/security\/fundamentals\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more about Azure Security<\/a><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"reinforcing-transparency-through-trust-with-open-sourced-designs\">Reinforcing transparency through trust with open-sourced designs<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Our approach to hardware security is grounded in a simple belief: transparency builds trust, and industry collaboration strengthens security.&nbsp;Openness strengthens trust by allowing customers, partners, and regulators to validate design choices and security boundaries.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This week, at the Open Compute Project (OCP) EMEA Summit, we announced plans to open the Azure Integrated HSM hardware to the broader open hardware ecosystem. Through\u00a0OCP,\u00a0we\u00a0plan to\u00a0release the\u00a0Azure Integrated HSM firmware, driver, and software stack as open source, and launch an OCP workgroup to\u00a0guide ongoing\u00a0development\u2014spanning architectural design, protocol specifications, firmware, and\u00a0hardware. The Azure Integrated HSM firmware is now available through the Azure Integrated HSM <a href=\"https:\/\/github.com\/Azure\/azihsm-fw\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub repository<\/a>, alongside independent validation artifacts such as the <a href=\"https:\/\/github.com\/opencomputeproject\/OCP-Security-SAFE\/tree\/main\/Reports\/Microsoft\/2026\/microsoft_hsm_cryptographic_module\/v3.4.6.7-60219024\" target=\"_blank\" rel=\"noreferrer noopener\">OCP SAFE audit report<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This openness is particularly important for regulated industries and sovereign cloud scenarios, where independent validation of security controls is required. By making key components available for external review, Azure Integrated HSM enables customers, partners, and regulators to assess implementation details directly rather than relying solely on vendor assertions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This approach strengthens confidence in the platform and helps establish a more transparent and verifiable foundation for cloud security, while reducing reliance on proprietary vendor specific protocols. At a time when cryptographic trust underpins everything from AI inference to national digital infrastructure, open sourcing the HSM is a practical step toward interoperability, auditability, and customer confidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-tiered-approach-to-key-management\">A tiered approach to key management<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">This design complements services like <a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/key-vault\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Key Vault<\/a> and <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/key-vault\/managed-hsm\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Managed HSM<\/a>, which continue to provide centralized key lifecycle management, governance, and policy enforcement. Azure Integrated HSM adds a new layer; one that brings cryptographic protection down to the individual server, so that keys are protected not just when they are stored but while they are actively being used by workloads. The Azure Integrated HSM also supports industry standards such as TDISP, enabling secure binding between the HSM and confidential computing environments. <\/p>\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69f3beaada015&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69f3beaada015\" class=\"wp-block-image aligncenter size-full wp-lightbox-container\"><img decoding=\"async\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Picture1-1.webp\" alt=\"\" class=\"wp-image-50752 webp-format\" data-orig-src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Picture1-1.webp\"><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">In the coming weeks, Azure Integrated HSM will be available in Azure V7 virtual machines to all customers globally.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"setting-a-new-standard-for-server-local-key-protection-at-scale\">Setting a new standard for server-local key protection at scale <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">With Azure Integrated HSM, encryption keys are generated, stored, and used entirely within hardened hardware. Keys are designed to never appear in host memory, guest memory, or software processes even during active cryptographic operations. By keeping keys within the hardware boundary at all times, Azure Integrated HSM eliminates entire classes of key and credential exfiltration attacks that target memory or software layers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The result is true customer control enforced by silicon, not policy. Security is no longer dependent on operational discipline or complex isolation assumptions; it is enforced by hardware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Traditional cloud security models rely on centralized HSM services accessed over the network. While effective, these models introduce shared blast radius, scalability challenges, and performance constraints as workloads grow.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By anchoring cryptographic protection directly to the server, security scales naturally with compute. There are no shared bottlenecks, no added network hops, and no need to trade performance for protection. As Azure scales, security scales with it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With hardware roots of trust, measured boot, and attestation, Azure Integrated HSM makes trust verifiable rather than contractual. Customers and regulators can cryptographically validate that approved hardware, firmware, and configurations are in place. This can be further verified by the open-source firmware. Trust is no longer something you accept; it is something you can prove.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Together, these capabilities establish a new baseline for cloud security, one in which hardware-enforced, verifiable trust is the default for modern workloads, from core infrastructure services to the next generation of AI. When combined with confidential computing, open silicon roots of trust, <a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/virtual-machines\/boost\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Boost<\/a>, and datacenter-level secure control modules, the Azure Integrated HSM helps establish a vertically integrated chain of trust, from silicon to software.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We invite customers, partners, and the broader open-source community to contribute to the architecture and help shape future standards. Together, we can build secure, sovereign, and open cloud infrastructure for the challenges ahead.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For additional information, read the <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/azureinfrastructureblog\/securing-azure-infrastructure-with-silicon-innovation\/4293834\" target=\"_blank\" rel=\"noreferrer noopener\">announcement blog<\/a> and learn more about <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Security<\/a>.<\/p>\n\n\n\n<aside class=\"cta-block cta-block--align-right cta-block--has-image wp-block-msx-cta\" data-bi-an=\"CTA Block\">\n\t<div class=\"cta-block__content\">\n\t\t\t\t\t<div class=\"cta-block__image-container\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/image.jpg\" class=\"cta-block__image\" alt=\"\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/image.jpg 600w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/image-300x300.jpg 300w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/image-150x150.jpg 150w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\t\t\t<\/div>\n\t\t\n\t\t<div class=\"cta-block__body\">\n\t\t\t<h2 class=\"cta-block__headline\">Azure Security<\/h2>\n\t\t\t<p class=\"cta-block__text\">Get a comprehensive look at the security available with Azure.<\/p>\n\t\t\t\t\t\t\t<div class=\"cta-block__actions\">\n\t\t\t\t\t<a\n\t\t\t\t\t\thref=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/overview\"\n\t\t\t\t\t\tclass=\"btn cta-block__link btn-link\"\n\t\t\t\t\t\ttarget=\"_blank\"\t\t\t\t\t>\n\t\t\t\t\t\tLearn more\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t<\/div>\n<\/aside>\n","protected":false},"excerpt":{"rendered":"<p>As cloud workloads become more agentic and AI systems handle increasingly sensitive data, trust must be engineered directly into infrastructure. Azure Integrated HSM brings hardware\u2011enforced key protection into Azure, extending cryptographic trust from silicon to services through verifiable and transparent design.<\/p>\n","protected":false},"author":113,"featured_media":50638,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1459],"tags":[],"audience":[3054],"content-type":[1465],"product":[2578],"tech-community":[2977],"topic":[],"coauthors":[21,3126],"class_list":["post-50750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","audience-business-decision-makers","content-type-announcements","product-azure-security","review-flag-3-1680286581-173","review-flag-never-1680286580-606","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Learn how Microsoft Azure Integrated HSM delivers hardware\u2011enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open\u2011source collaboration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how Microsoft Azure Integrated HSM delivers hardware\u2011enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open\u2011source collaboration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-30T18:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-30T19:35:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mark Russinovich, Saurabh Dighe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Russinovich, Saurabh Dighe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/\"},\"author\":[{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/author\\\/mark-russinovich\\\/\",\"@type\":\"Person\",\"@name\":\"Mark Russinovich\"},{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/author\\\/saurabh-dighe\\\/\",\"@type\":\"Person\",\"@name\":\"Saurabh Dighe\"}],\"headline\":\"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM\",\"datePublished\":\"2026-04-30T18:00:00+00:00\",\"dateModified\":\"2026-04-30T19:35:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/\"},\"wordCount\":867,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Azure-Integrated-Hardware-Security-1.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/\",\"url\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/\",\"name\":\"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Azure-Integrated-Hardware-Security-1.jpg\",\"datePublished\":\"2026-04-30T18:00:00+00:00\",\"dateModified\":\"2026-04-30T19:35:59+00:00\",\"description\":\"Learn how Microsoft Azure Integrated HSM delivers hardware\u2011enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open\u2011source collaboration.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Azure-Integrated-Hardware-Security-1.jpg\",\"contentUrl\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Azure-Integrated-Hardware-Security-1.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Man working in a data center\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/microsoft_logo.webp\",\"contentUrl\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/microsoftazure\",\"https:\\\/\\\/x.com\\\/azure\",\"https:\\\/\\\/www.instagram.com\\\/microsoftdeveloper\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/16188386\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/#\\\/schema\\\/person\\\/d96590cebe9993370109d0184f6a4f99\",\"name\":\"Hanan Irfan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b79eed7370fc7dcc6010ce1a374e302612fd60e4fe58d8b84bb328db3b54752?s=96&d=mm&r=gce4dc628ab57a91261f158d015b11177\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b79eed7370fc7dcc6010ce1a374e302612fd60e4fe58d8b84bb328db3b54752?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b79eed7370fc7dcc6010ce1a374e302612fd60e4fe58d8b84bb328db3b54752?s=96&d=mm&r=g\",\"caption\":\"Hanan Irfan\"},\"url\":\"https:\\\/\\\/azure.microsoft.com\\\/en-us\\\/blog\\\/author\\\/hananirfan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM | Microsoft Azure Blog","description":"Learn how Microsoft Azure Integrated HSM delivers hardware\u2011enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open\u2011source collaboration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/","og_locale":"en_US","og_type":"article","og_title":"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM | Microsoft Azure Blog","og_description":"Learn how Microsoft Azure Integrated HSM delivers hardware\u2011enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open\u2011source collaboration.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2026-04-30T18:00:00+00:00","article_modified_time":"2026-04-30T19:35:59+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg","type":"image\/jpeg"}],"author":"Mark Russinovich, Saurabh Dighe","twitter_card":"summary_large_image","twitter_image":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Mark Russinovich, Saurabh Dighe","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/mark-russinovich\/","@type":"Person","@name":"Mark Russinovich"},{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/saurabh-dighe\/","@type":"Person","@name":"Saurabh Dighe"}],"headline":"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM","datePublished":"2026-04-30T18:00:00+00:00","dateModified":"2026-04-30T19:35:59+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/"},"wordCount":867,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/","name":"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg","datePublished":"2026-04-30T18:00:00+00:00","dateModified":"2026-04-30T19:35:59+00:00","description":"Learn how Microsoft Azure Integrated HSM delivers hardware\u2011enforced key protection in the cloud, combining FIPS Level 3 assurances with transparency and open\u2011source collaboration.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2026\/04\/Azure-Integrated-Hardware-Security-1.jpg","width":1920,"height":1080,"caption":"Man working in a data center"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enforcing-trust-and-transparency-open-sourcing-the-azure-integrated-hsm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Enforcing trust and transparency: Open-sourcing the Azure Integrated HSM"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/d96590cebe9993370109d0184f6a4f99","name":"Hanan Irfan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b79eed7370fc7dcc6010ce1a374e302612fd60e4fe58d8b84bb328db3b54752?s=96&d=mm&r=gce4dc628ab57a91261f158d015b11177","url":"https:\/\/secure.gravatar.com\/avatar\/3b79eed7370fc7dcc6010ce1a374e302612fd60e4fe58d8b84bb328db3b54752?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b79eed7370fc7dcc6010ce1a374e302612fd60e4fe58d8b84bb328db3b54752?s=96&d=mm&r=g","caption":"Hanan Irfan"},"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/hananirfan\/"}]}},"msxcm_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/50750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/113"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=50750"}],"version-history":[{"count":8,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/50750\/revisions"}],"predecessor-version":[{"id":50766,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/50750\/revisions\/50766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media\/50638"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=50750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=50750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=50750"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=50750"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=50750"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=50750"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=50750"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=50750"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=50750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}