Skip to main content
Certyneo

HSM vs TPM: what's the difference and which one to choose?

HSM and TPM are two hardware security technologies often confused, but with very distinct roles. Discover how to choose the right module according to your needs.

11 min read

Certyneo Team

Editor — Certyneo · About Certyneo

Introduction: two modules, two security philosophies

In the field of applied cryptography and digital key protection, two technologies consistently emerge in discussions among Chief Information Security Officers and Information Security Managers: the HSM (Hardware Security Module) and the TPM (Trusted Platform Module). These two hardware devices share a common objective — protecting sensitive cryptographic operations — but their architecture, use cases and certification levels differ fundamentally. Confusing the two can lead to inappropriate infrastructure choices, or even regulatory compliance gaps. This article gives you the keys to understand the HSM vs TPM difference, identify when to use one or the other, and make the best decision for your organisation in 2026.

---

What is an HSM (Hardware Security Module)?

A Hardware Security Module is a dedicated hardware device, specifically designed to generate, store and manage cryptographic keys in a physically and logically secure environment. It is a standalone component — often in the form of a PCIe card, network appliance or cloud service (HSM as a Service) — whose primary function is to execute high-performance cryptographic operations without ever exposing keys in plain text outside the module.

Technical characteristics of HSM

HSMs are certified according to rigorous international standards, notably FIPS 140-2 / FIPS 140-3 (levels 2, 3 or 4) published by the American NIST, and Common Criteria EAL4+ according to ISO/IEC 15408. These certifications involve physical anti-tampering mechanisms (tamper-resistance), intrusion detectors, and automatic key destruction in case of compromise attempts.

A typical HSM offers:

  • High processing capacity: up to several thousand RSA or ECDSA operations per second
  • Multi-tenancy: management of hundreds of independent cryptographic partitions
  • Standardised interfaces: PKCS#11, Microsoft CNG, JCA/JCE, OpenSSL engine
  • Complete audit trail: immutable logging of every operation

Typical HSM use cases

HSMs are the core of qualified electronic signature within the meaning of the eIDAS regulation, where the signer's private key must be generated and stored in a qualified signature creation device (QSCD). They also equip certification authorities (CA/PKI), payment systems (PCI-DSS HSM protocol), database encryption infrastructures, and CI/CD code signing environments.

Qualified electronic signature in business almost systematically relies on an HSM certified as a QSCD to guarantee maximum legal value of signatures.

---

What is a TPM (Trusted Platform Module)?

The Trusted Platform Module is a security chip integrated directly onto the motherboard of a computer, server or connected device. Standardised by the Trusted Computing Group (TCG), whose TPM 2.0 specification is also standardised under ISO/IEC 11889:2015, the TPM is designed to secure the platform itself rather than serve as a centralised shared cryptographic service.

TPM architecture and operation

Unlike the HSM, the TPM is a single-use component, tied to a specific piece of hardware. It cannot be moved or shared between multiple machines. Its main functions include:

  • Boot integrity measurement (Secure Boot, Measured Boot) via Platform Configuration Registers (PCR)
  • Platform-linked key storage: keys generated by the TPM can only be used on the machine that created them
  • Cryptographic random number generation (RNG)
  • Remote attestation: proving to a remote server that the platform is in a known trusted state
  • Volume encryption: BitLocker on Windows, dm-crypt with TPM on Linux rely directly on the TPM

TPM limitations for advanced enterprise uses

TPM 2.0 is certified FIPS 140-2 level 1 at best, which is significantly lower than the FIPS 140-3 level 3 certifications of professional HSMs. Its cryptographic processing capacity is limited (a few dozen operations per second), and it does not natively support PKCS#11 or CNG interfaces as comprehensively as a dedicated HSM. For advanced or qualified electronic signature, the TPM alone is generally insufficient under eIDAS requirements for QSCD in Annex II.

---

Fundamental differences between HSM vs TPM: comparative table

Understanding the HSM vs TPM Trusted Platform Module difference comes down to a structured comparison of the determining criteria for business.

Certification level and security assurance

| Criterion | HSM | TPM | |---|---|---| | FIPS certification | 140-3 levels 2 to 4 | 140-2 level 1 | | Common Criteria | EAL4+ to EAL7 | EAL4 | | eIDAS QSCD qualification | Yes (e.g.: Thales Luna, Utimaco) | No | | Physical anti-tampering | Advanced (auto-destruction) | Basic |

Capacity, scalability and integration

HSMs are multi-user and multi-application devices: a single network appliance can simultaneously serve hundreds of clients, applications and services via PKCS#11 or REST API. They integrate into high availability architectures (active-active clusters) and support industrial cryptographic throughputs.

The TPM, on the other hand, is single-machine and single-tenant by design. It excels at securing workstations, protecting Windows Hello for Business access credentials, and firmware integrity. For electronic signature operations in document workflows, a TPM cannot play the role of a shared cryptographic service.

Cost and deployment

An enterprise-grade network HSM (Thales Luna Network HSM, Utimaco SecurityServer, AWS CloudHSM) represents an investment of €15,000 to €80,000 for on-premise hardware, or between €1.50 and €3.00 per hour in managed cloud mode depending on providers. The TPM, meanwhile, is built in at no extra cost to virtually all professional PCs, servers and embedded systems since 2014 (mandatory for Windows 11 since 2021).

---

When to use an HSM, when to use a TPM in business?

The answer to this question depends on your operational context, regulatory obligations and your information system architecture.

Choose an HSM for:

  • Deploying an internal PKI: your certification authority root keys must imperatively reside in a certified HSM to obtain browser trust (CA/Browser Forum Baseline Requirements)
  • Issuing qualified electronic signatures: in accordance with Annex II of eIDAS Regulation 910/2014, QSCDs must be certified to equivalent standards of EAL4+ minimum; the comparison of electronic signature solutions details these requirements
  • Securing high-volume financial transactions: PCI-DSS v4.0 standards (section 3.6) require protection of card data encryption keys in HSMs
  • Database or cloud encryption: AWS CloudHSM, Azure Dedicated HSM, Google Cloud HSM allow you to retain control of keys (BYOK / HYOK)
  • Code signing and CI/CD build integrity: signing software artefacts for secure supply chains requires an HSM to prevent key theft

Choose a TPM for:

  • Securing workstation and server boot: Secure Boot + Measured Boot + remote attestation via TPM 2.0 forms the basis of Zero Trust on endpoint
  • Full-disk encryption: BitLocker with TPM protects data at rest without dependence on an external service
  • Hardware authentication of workstations: Windows Hello for Business uses the TPM to store authentication private keys with no possibility of extraction
  • NIS2 compliance on endpoint security: the NIS2 Directive (EU 2022/2555), transposed into French law by the Act of 13 June 2024, imposes proportionate technical measures for information system security; the TPM directly contributes to securing physical assets
  • Industrial IoT projects: TPMs embedded in automation systems and SCADA systems enable remote attestation without dedicated HSM infrastructure

Hybrid HSM + TPM architectures

In large organisations, HSM and TPM are not opposed: they complement each other. A server equipped with a TPM 2.0 can attest its integrity to a centralised management service, whilst business cryptographic operations (signature, application data encryption) are delegated to a network HSM cluster. This architecture is recommended by ANSSI in its guide on managing risks related to trusted service providers (PSCE). Consulting the electronic signature glossary can help technical teams harmonise terminology when defining this architecture.

The choice between HSM and TPM directly affects your organisation's compliance with several European and international regulatory frameworks.

eIDAS Regulation 910/2014 and eIDAS 2.0 (EU Regulation 2024/1183)

Article 29 of the eIDAS Regulation requires that qualified electronic signatures be created by means of a Qualified Signature Creation Device (QSCD), defined in Annex II. These devices must ensure the confidentiality of the private key, its uniqueness and its integrity. The list of recognised QSCDs is published by national accreditation bodies (in France: ANSSI). FIPS 140-3 level 3 or Common Criteria EAL4+ certified HSMs appear on these lists; TPMs do not. A signature service provider like Certyneo relies on qualified HSMs to guarantee maximum probative value of issued signatures.

French Civil Code, articles 1366 and 1367

Article 1366 recognises the legal value of electronic writing "provided that the person from whom it emanates can be duly identified and that it is established and preserved in conditions of a nature to guarantee its integrity". Article 1367 clarifies the conditions for reliable electronic signature, implicitly referring to eIDAS requirements for qualified signatures.

GDPR 2016/679, articles 25 and 32

The principle of privacy by design (article 25) and the obligation of appropriate technical measures (article 32) require the protection of cryptographic keys used to encrypt personal data. Use of a certified HSM constitutes a state-of-the-art measure (within the meaning of GDPR recital 83) to demonstrate compliance during a CNIL inspection.

NIS2 Directive (EU 2022/2555), transposed into France

The NIS2 Directive, applicable to essential and important entities since October 2024, imposes at article 21 risk management measures including software supply chain security and encryption. HSMs directly meet these requirements for critical operations, whilst TPMs contribute to endpoint security.

ETSI standards

The ETSI EN 319 401 standard (general requirements for trust service providers) and ETSI EN 319 411-1/2 (requirements for CAs issuing qualified certificates) require storage of CA keys in certified HSMs. The ETSI EN 319 132 standard (XAdES) and ETSI EN 319 122 (CAdES) define signature formats that presuppose the use of certified secure modules.

ANSSI recommendations

ANSSI publishes the RGS (General Security Reference) framework and its guides on HSMs, recommending use of certified modules for any sensitive PKI infrastructure in public organisations and OIV/OSE. Non-compliance with these recommendations can constitute a breach of NIS2 obligations for affected entities.

Usage scenarios: HSM or TPM depending on context

Scenario 1: an asset management company with internal PKI

An asset management company managing several billion euros in assets under management needs to electronically sign regulatory reporting (AIFMD, MiFID II) and investment contracts with qualified legal value. It deploys an internal PKI whose root keys (Root CA) and intermediate keys (Issuing CA) are protected in two network HSMs in a high-availability cluster, certified FIPS 140-3 level 3. Qualified certificates are issued on partner HSMs compliant with eIDAS QSCD. Result: 100% of signatures have qualified value, regulatory audits by the AMF confirm compliance, and the time to sign investment documents drops from 4 days to less than 2 hours. The cost of HSM infrastructure is recovered in less than 18 months compared to potential non-compliance costs.

Scenario 2: a 150-employee industrial SME securing its workstation fleet

An SME in the aeronautics manufacturing sector, a Tier 2 supplier subject to CMMC requirements (Cybersecurity Maturity Model Certification) and NIS2 recommendations, must secure 150 Windows workstations against theft of sensitive technical data. The CISO deploys BitLocker with TPM 2.0 across the entire fleet, coupled with Windows Hello for Business for passwordless authentication. Remote attestation via TPM is integrated into the MDM solution (Microsoft Intune). No HSM is required in this context: TPMs built into Dell and HP machines are sufficient. Result: the risk of data breach following laptop theft is reduced to near-zero, and the company's cybersecurity maturity score improves by 40% according to CMMC self-assessment. Additional cost: €0 (TPM already built into machines).

Scenario 3: a multi-tenant SaaS electronic signature platform operator

A SaaS operator offering electronic signature services to several hundred enterprise customers must guarantee cryptographic isolation between customers and eIDAS qualification of its service. It deploys architecture based on HSMs in dedicated cloud mode (AWS CloudHSM or Thales DPoD), with one HSM partition per large tenant and a shared pool for standard customers. Each customer benefits from keys isolated in its partition, independently auditable. TPMs equip application servers for platform integrity attestation during eIDAS certification audits (QTSP). Result: the operator obtains QTSP qualification from ANSSI, enabling it to issue qualified signatures. The HSM as a Service model reduces infrastructure capex by 60% compared to an on-premise solution, according to comparable sector benchmarks.

Conclusion

The difference between HSM and TPM is fundamental: the HSM is a shared, high-performance and multi-applicative cryptographic service, essential for PKI, eIDAS qualified signatures and compliance with PCI-DSS or NIS2 at scale. The TPM is a trust component tied to a specific hardware platform, ideal for securing endpoints, secure boot and local authentication. In the majority of mature enterprise architectures in 2026, the two coexist with complementary and non-interchangeable roles.

If your organisation is looking to deploy a qualified electronic signature solution based on certified HSM infrastructure, without managing technical complexity in-house, Certyneo offers you a turnkey SaaS platform, compliant with eIDAS and GDPR. Discover Certyneo pricing or contact our experts for an audit of your cryptographic needs.

Try Certyneo for free

Send your first signature envelope in less than 5 minutes. 5 free envelopes per month, no credit card required.

Go deeper

Our comprehensive guides to master electronic signature.