Remote Key Attestation

Being able to prove that a key pair was generated and is managed remotely inside a hardware security module by a user will be critical to expanding the use and security of PKI in a cloud-based world.

Key attestation, in this context, is the technical ability to prove to a remote party that a private key was generated inside, and is managed inside, and not exportable from, a hardware cryptographic module.

While several vendors offer remote key generation services, they all do it differently. This makes it hard or even impossible to scale usage of remote key attestation and create trust across the ecosystem.

The PKI Consortium will start by creating a simple market survey, to make a list of the different available key attestation solutions being used by different vendors (including questions on how they work and are used technically). One we have useful data, we can consider developing common standards that the industry may want to adopt.

Participate in our community discussions and/or join the consortium