Hardware security modules

Power requirements

Module Maximum power

Solo

9.9W

Solo XC

24W

Make sure that the power supply in your computer is rated to supply the required electric power.

The modules are intended for installation into a certified personal computer, server or similar equipment.

If your computer can supply the required electric power and sufficient cooling, you can install multiple modules in your computer.

Handling modules

The module contains solid-state devices that can withstand normal handling. However, do not drop the module or expose it to excessive vibration.

Before installing hardware, you must disconnect your computer from the power supply. Ensure that a grounded (earthed) contact remains. Perform the installation with care, and follow all safety instructions in this guide and from your computer manufacturer.
Static discharge can damage modules. Do not touch the module connector pins, or the exposed area of the module.

Leave the module in its anti-static bag until you are ready to install it. Always wear an anti-static wrist strap that is connected to a grounded metal object. You must also ensure that the computer frame is grounded while you are installing or removing an internal module.

Environmental requirements

When you install the module, ensure that there is good air flow around it. To maximize air flow, use a PCIe slot with no neighboring modules if possible. If air flow is limited, consider fitting extra cooling fans to your computer case.

Failure to provide adequate cooling can result in damage to the module or the computer into which the module is fitted.

Always handle the module correctly. For more information, see Handling modules.

Module operational temperature and humidity specifications

The Solo modules operate within the following environmental conditions.

Solo environmental conditions

Operating range

Comments

Min.

Max.

Ambient operating temperature

10°C

35°C

Subject to sufficient air flow

Storage temperature

-20°C

70°C

-

Operating humidity

10%

90%

Relative. Non-condensing at 35°C

Storage humidity

0

85%

Relative. Non-condensing at 35°C

The Solo XC module operates within the following environmental conditions.

Solo XC environmental conditions

Operating range

Comments

Min.

Max.

Ambient operating temperature

5°C

55°C

-

Storage temperature

-5°C

60°C

-

Transportation temperature

-40°C

70°C

-

Operating humidity

5%

85%

Relative. Non-condensing at 30°C

Storage humidity

5%

93%

Relative. Non-condensing at 30°C

Transportation humidity

5%

93%

Relative. Non-condensing at 30°C

The modules are designed to operate in moderate climates only. Never operate the modules in dusty, damp, or excessively hot conditions. Never install, store, or operate the modules at locations where it may be subject to dripping or splashing liquids.

Cooling requirements

Adequate cooling of the module is essential for trouble-free operation and a long operational life.

During operation you can use the supplied stattree utility to check the actual and maximum temperature of the module. It is advised to do this directly after installing the module in its normal working environment. Monitor the temperature of the module over its first few days of operation. If the module exceeds the safe operating temperature, it stops operating and displays the SOS-T error message on the Status LED (see Status indicators).

Physical location considerations

Entrust nShield HSMs are certified to NIST FIPS 140-2 Level 2 and 3. In addition to the intrinsic protection provided by an nShield HSM, customers must exercise due diligence to ensure that the environment within which the nShield HSMs are deployed is configured properly and is regularly examined as part of a comprehensive risk mitigation program to assess both logical and physical threats. Applications running in the environment shall be authenticated to ensure their legitimacy and to thwart possible proliferation of malware that could infiltrate these as they access the HSMs’ cryptographic services. The deployed environment must adopt 'defense in depth' measures and carefully consider the physical location to prevent detection of electromagnetic emanations that might otherwise inadvertently disclose cryptographic material.