Layer 0 (L0) - Hardware Crypto Boundary
Objective
Provide a physically and logically protected boundary for key storage and sensitive operations that must occur in hardware. Typical devices include HSMs, TPMs, smart cards, and other validated hardware modules.
Responsibilities
- Protect keys at rest inside the module boundary
- Provide true random number generation and approved DRBGs
- Perform sensitive operations such as unwrap, sign, and key derivation when required by policy
- Execute power up and conditional self tests and enforce error states
Common components
- Network HSMs, PCIe HSMs, embedded TPMs
- Hardware backed key stores in cloud or on premises
- Hardware entropy sources, sensors and tamper evidence
Implementation guidance
- Define and document the hardware boundary. Reference the module certificate and Security Policy
- Use approved mechanisms for key entry and output. Enforce separation of roles
- Bind hardware identities to platform attestation used by L7
Validation and evidence
- Reference CMVP certificate number and Security Policy
- Capture initialization procedures, self test logs, error handling, and tamper response
- Record inventory and serials for devices in scope
Common pitfalls
- Assuming a device is validated without checking the exact model, firmware, and certificate
- Operating in a configuration that is outside the Security Policy
- Mixing hardware and software keys without documented controls
Relationship to other AFIPS Layers
| From | To | Why this edge exists | Typical operations | Evidence |
|---|---|---|---|---|
| L2 | L0 | Hardware backed keys or RNG are mandated | Keygen, unwrap, sign in HSM or TPM. | HSM audit logs, module SP references, serials |
| L7 | L0 | Generate and hold sensitive roots in hardware | Root CA keys, KEKs. | Dual control procedures, device inventory |