Skip to main content
Certyneo

HSM vs TPM: What's the Difference and Which One Should You Choose?

HSM and TPM are two hardware security technologies often confused, but with very distinct roles. Discover how to choose the right module based on your needs.

11 min read

Certyneo Team

Writer — Certyneo · About Certyneo

Introduction: Two Modules, Two Security Philosophies

In the field of applied cryptography and digital key protection, two technologies consistently come up in discussions among CIOs and CISOs: HSM (Hardware Security Module) and TPM (Trusted Platform Module). These two hardware devices share a common objective — to protect sensitive cryptographic operations — but their architecture, use cases, and certification levels differ fundamentally. Confusing the two can lead to inadequate infrastructure choices or even regulatory compliance gaps. This article gives you the keys to understanding the HSM vs TPM difference, identifying when to use one or the other, and making the best decision for your organization in 2026.

---

What is an HSM (Hardware Security Module)?

A Hardware Security Module is a dedicated hardware device designed specifically to generate, store, and manage cryptographic keys in a physically and logically secure environment. It is a standalone component — often in the form of a PCIe card, network appliance, or cloud service (HSM as a Service) — whose primary function is to execute cryptographic operations at high performance without ever exposing keys in plaintext outside the module.

Technical Characteristics of HSM

HSMs are certified according to rigorous international standards, particularly FIPS 140-2 / FIPS 140-3 (levels 2, 3, or 4) published by the U.S. NIST, and Common Criteria EAL4+ according to ISO/IEC 15408. These certifications require anti-tampering mechanisms (tamper-resistance), intrusion detectors, and automatic key destruction in case of compromise attempts.

A typical HSM offers:

  • High processing capacity: up to several thousand RSA or ECDSA operations per second
  • Multi-tenancy: management of hundreds of independent cryptographic partitions
  • Standardized interfaces: PKCS#11, Microsoft CNG, JCA/JCE, OpenSSL engine
  • Complete audit trail: immutable logging of every operation

Typical HSM Use Cases

HSMs are the core of qualified electronic signature under the eIDAS regulation, where the signatory's private key must be generated and stored in a qualified signature creation device (QSCD). They also equip certificate authorities (CA/PKI), payment systems (PCI-DSS protocol HSM), database encryption infrastructures, and CI/CD code signing environments.

Qualified electronic signature in the enterprise almost systematically relies on an HSM certified as a QSCD to guarantee maximum legal value of signatures.

---

What is a TPM (Trusted Platform Module)?

A Trusted Platform Module is a security chip integrated directly on the motherboard of a computer, server, or connected device. Standardized by the Trusted Computing Group (TCG), whose TPM 2.0 specification is also standardized under ISO/IEC 11889:2015, the TPM is designed to secure the platform itself rather than serve as a centralized, shared cryptographic service.

TPM Architecture and Operation

Unlike the HSM, the TPM is a single-use component tied to a specific hardware device. It cannot be moved or shared between multiple machines. Its primary functions include:

  • Boot integrity measurement (Secure Boot, Measured Boot) via Platform Configuration Registers (PCR)
  • Platform-bound key storage: keys generated by the TPM can only be used on the machine that created them
  • Cryptographic random number generation (RNG)
  • Remote attestation: proving to a remote server that the platform is in a known trusted state
  • Volume encryption: BitLocker on Windows and dm-crypt with TPM on Linux rely directly on the TPM

TPM Limitations for Advanced Enterprise Use

TPM 2.0 is certified FIPS 140-2 level 1 at best, which is significantly lower than the FIPS 140-3 level 3 certifications of professional HSMs. Its cryptographic processing capacity is limited (a few dozen operations per second), and it does not natively support PKCS#11 or CNG interfaces as comprehensively as a dedicated HSM. For advanced or qualified electronic signature, the TPM alone is generally insufficient regarding eIDAS Annex II requirements for QSCDs.

---

Fundamental Differences Between HSM vs TPM: Comparative Table

Understanding the HSM vs TPM Trusted Platform Module difference involves a structured comparison of the criteria that are decisive for the enterprise.

Certification Level and Security Assurance

| Criterion | HSM | TPM | |---|---|---| | FIPS Certification | 140-3 level 2 to 4 | 140-2 level 1 | | Common Criteria | EAL4+ to EAL7 | EAL4 | | eIDAS QSCD Qualification | Yes (e.g. Thales Luna, Utimaco) | No | | Physical Tamper-Resistance | Advanced (auto-destruction) | Basic |

Capacity, Scalability, and Integration

HSMs are multi-user and multi-application devices: a single network appliance can simultaneously serve hundreds of clients, applications, and services via PKCS#11 or REST API. They integrate into high-availability architectures (active-active clusters) and support industrial cryptographic throughputs.

The TPM, on the other hand, is single-machine and single-tenant by design. It excels in securing the workstation, protecting Windows Hello for Business access credentials, and ensuring firmware integrity. For electronic signature operations in document workflows, a TPM cannot serve as a shared cryptographic service.

Cost and Deployment

An enterprise-grade network HSM (Thales Luna Network HSM, Utimaco SecurityServer, AWS CloudHSM) represents an investment of €15,000 to €80,000 for on-premises hardware, or between €1.50 and €3.00 per hour in managed cloud mode depending on providers. The TPM, meanwhile, is integrated at no additional cost in virtually all business PCs, servers, and embedded systems since 2014 (mandatory for Windows 11 since 2021).

---

When to Use an HSM, When to Use a TPM in the Enterprise?

The answer to this question depends on your operational context, regulatory obligations, and the architecture of your information system.

Choose an HSM for:

  • Deploying an internal PKI: your certificate authority's root keys must imperatively reside in a certified HSM to obtain browser trust (CA/Browser Forum Baseline Requirements)
  • Issuing qualified electronic signatures: in compliance with Annex II of eIDAS Regulation No. 910/2014, QSCDs must be certified to standards equivalent to at least EAL4+; the comparison of electronic signature solutions details these requirements
  • Securing high-volume financial transactions: PCI-DSS v4.0 standards (section 3.6) require protection of card data encryption keys in HSMs
  • Database or cloud encryption: AWS CloudHSM, Azure Dedicated HSM, Google Cloud HSM allow you to retain key control (BYOK / HYOK)
  • Code signing and CI/CD build integrity: signing software artifacts for secure supply chain requires an HSM to prevent key theft

Choose a TPM for:

  • Securing workstation and server startup: Secure Boot + Measured Boot + remote attestation via TPM 2.0 forms the basis of Zero Trust on endpoint
  • Full-disk encryption: BitLocker with TPM protects data at rest without dependency on external services
  • Hardware-based workstation authentication: Windows Hello for Business uses the TPM to store authentication private keys without possibility of extraction
  • NIS2 compliance on endpoint security: the NIS2 Directive (EU 2022/2555), implemented in French law by the law of June 13, 2024, imposes proportionate technical measures for information system security; the TPM contributes directly to the security of physical assets
  • Industrial IoT projects: TPMs embedded in automation systems and SCADA allow remote attestation without dedicated HSM infrastructure

Hybrid HSM + TPM Architectures

In large organizations, HSM and TPM are not opposed: they complement each other. A server equipped with a TPM 2.0 can attest its integrity to a centralized management service, while business cryptographic operations (signature, application data encryption) are delegated to a network HSM cluster. This architecture is recommended by ANSSI in its guide on managing risks related to trust service providers (PSCE). Consulting the electronic signature glossary can help technical teams harmonize terminology when defining this architecture.

The choice between HSM and TPM directly engages your organization's compliance with several European and international regulatory frameworks.

eIDAS Regulation No. 910/2014 and eIDAS 2.0 (EU Regulation 2024/1183)

Article 29 of eIDAS requires that qualified electronic signatures be created using a Qualified Signature Creation Device (QSCD), defined in Annex II. These devices must guarantee the confidentiality of the private key, its uniqueness, and its inviolability. The list of recognized QSCDs is published by national accreditation bodies (in France: ANSSI). HSMs certified FIPS 140-3 level 3 or Common Criteria EAL4+ appear on these lists; TPMs do not. A signature provider like Certyneo relies on qualified HSMs to guarantee maximum probative value of emitted signatures.

French Civil Code, Articles 1366 and 1367

Article 1366 recognizes the legal value of electronic writing "provided that the person from whom it emanates can be duly identified and that it is established and kept under conditions likely to guarantee its integrity". Article 1367 specifies the conditions for reliable electronic signature, implicitly referring to eIDAS requirements for qualified signatures.

GDPR No. 2016/679, Articles 25 and 32

The privacy by design principle (Article 25) and the obligation to implement appropriate technical measures (Article 32) require the protection of cryptographic keys used to encrypt personal data. Using a certified HSM constitutes a state-of-the-art measure (state of the art within the meaning of GDPR recital 83) to demonstrate compliance during a CNIL inspection.

NIS2 Directive (EU 2022/2555), Implemented in France

The NIS2 Directive, applicable to essential and important entities since October 2024, requires in Article 21 risk management measures including software supply chain security and encryption. HSMs directly address these requirements for critical operations, while TPMs contribute to endpoint security.

ETSI Standards

The ETSI EN 319 401 standard (general requirements for trust service providers) and ETSI EN 319 411-1/2 (requirements for CAs issuing qualified certificates) require storage of CA keys in certified HSMs. The ETSI EN 319 132 standard (XAdES) and ETSI EN 319 122 (CAdES) define signature formats that presuppose the use of certified secure modules.

ANSSI Recommendations

ANSSI publishes the RGS (General Security Referential) and its guides on HSMs, recommending the use of certified modules for any sensitive PKI infrastructure in public bodies and critical operators/essential service providers. Non-compliance with these recommendations may constitute a breach of NIS2 obligations for entities concerned.

Use Case Scenarios: HSM or TPM Depending on Context

Scenario 1: A Financial Asset Management Company with Internal PKI

A financial management company managing several billion euros in assets under management needs to electronically sign regulatory reporting (AIFMD, MiFID II) and investment contracts with qualified legal value. It deploys an internal PKI whose root keys (Root CA) and intermediate keys (Issuing CA) are protected in two network HSMs in high-availability cluster, certified FIPS 140-3 level 3. Qualified certificates are issued on partner HSMs compliant with eIDAS QSCD. Result: 100% of signatures have qualified value, regulatory audits by the AMF confirm compliance, and the document signing time decreases from 4 days to less than 2 hours. The HSM infrastructure cost is amortized in less than 18 months compared to potential non-compliance costs.

Scenario 2: An Industrial SME with 150 Employees Securing Its Workstation Fleet

An SME in the aerospace manufacturing sector, a rank-2 supplier subject to CMMC (Cybersecurity Maturity Model Certification) requirements and NIS2 recommendations, must secure 150 Windows workstations against theft of sensitive technical data. The CISO deploys BitLocker with TPM 2.0 across the entire fleet, coupled with Windows Hello for Business for passwordless authentication. Remote attestation via TPM is integrated into the MDM solution (Microsoft Intune). No HSM is necessary in this context: the TPMs integrated into Dell and HP workstations are sufficient. Result: the risk of data leakage due to physical laptop theft is reduced to nearly zero, and the SME's cybersecurity maturity score improves by 40% according to self-assessment CMMC. Additional cost: €0 (TPM already integrated into machines).

Scenario 3: A Multi-Client SaaS Platform Operator for Electronic Signature

A SaaS operator offering electronic signature services to several hundred client companies must guarantee cryptographic isolation between clients and eIDAS qualification of its service. It deploys an architecture based on cloud-dedicated HSMs (AWS CloudHSM or Thales DPoD), with one HSM partition per large tenant and a shared pool for standard clients. Each client benefits from keys isolated in its partition, independently auditable. TPMs equip application servers for platform integrity attestation during eIDAS certification audits (QTSP). Result: the operator obtains QTSP qualification from ANSSI, allowing it to issue qualified signatures. The HSM as a Service model reduces infrastructure capex by 60% compared to an on-premises solution, according to comparable sector benchmarks.

Conclusion

The difference between HSM and TPM is fundamental: the HSM is a shared, high-performance, multi-application cryptographic service, essential for PKI, eIDAS qualified signatures, and PCI-DSS or NIS2 compliance at scale. The TPM is a trust component tied to a specific hardware platform, ideal for securing endpoints, secure boot, and local authentication. In the majority of mature enterprise architectures in 2026, both coexist with complementary and non-interchangeable roles.

If your organization is looking to deploy a qualified electronic signature solution based on a certified HSM infrastructure, without managing technical complexity in-house, Certyneo offers you a turnkey SaaS platform, eIDAS and GDPR compliant. Discover Certyneo pricing or contact our experts for an audit of your cryptographic needs.

Try Certyneo for free

Send your first signature envelope in less than 5 minutes. 5 free envelopes per month, no credit card required.

Dive deeper

Our comprehensive guides to master electronic signatures.