PAM360 offers robust encryption methods to secure sensitive data. By default, PAM360 employs AES-256 bit encryption to protect the passwords. However, integrating with a Hardware Security Module (HSM) is recommended for organizations requiring heightened security. Specifically, PAM360 supports integration with the SafeNet Luna PCIe HSM, which handles all the encryption and decryption operations directly within the hardware. This approach not only strengthens data protection but also allows for the encrypted key to be securely stored within the hardware module, providing an additional layer of security against unauthorized access.
This document guides you through the integration process of SafeNet Luna PCIe HSM with PAM360.
Integrating PAM360 with SafeNet Luna PCIe HSM involves several steps, starting with configuring the HSM to align with your network requirements and ending with migrating from the default encryption method to utilizing SafeNet Luna PCIe HSM. The following image details the complete integration workflow.

To migrate your existing encryption method to SafeNet HSM, follow these steps:
Windows:
SwitchToHSM.bat
Linux:
sh SwitchToHSM.sh

To verify which encryption method is currently applied, navigate to the PAM360 interface and go to Admin >> Server Hardening >> Encryption and HSM. This section will display the current encryption method, confirming the successful integration and migration to SafeNet Luna PCIe HSM.