docs/documentation/platform/kms-configuration/aws-hsm.mdx
This guide provides instructions on securing Infisical project secrets using AWS CloudHSM. Integration with AWS CloudHSM is achieved by configuring it as a custom key store for AWS KMS. Follow the steps below to set up AWS KMS with AWS CloudHSM as the custom key store.
Before you get started, you'll need to configure a AWS CloudHSM cluster which meets the following criteria:
For more details on setting up your cluster, refer to the following AWS documentation.
To set up an AWS KMS custom key store with AWS CloudHSM, you will need the following:
kmsuser user in the AWS CloudHSM cluster with the crypto-user role.For more details, refer to the following AWS documentation.
Next, you'll need to create a AWS KMS key where you will set the key store you created previously.
<Steps> <Step title="Navigate to AWS KMS key creation page"> In your AWS console, proceed to `AWS KMS` > `Customer managed keys` and click **Create**. </Step> <Step title="Set key options"> Set Key type to `Symmetric` and Key usage to `Encrypt and decrypt`.  </Step> <Step title="Select key material origin"> In the advanced options, for the Key material origin field, select `AWS CloudHSM key store`. Then, click next.  </Step> <Step title="Choose key store"> Select the AWS CloudHSM key store you created earlier.  </Step> <Step title="Finish KMS key creation"> Proceed with creating the AWS KMS Key. </Step> </Steps>You should now have an AWS KMS that has a custom key store set to AWS CloudHSM. To secure project resources, you will need to add this AWS KMS to your Infisical organization. To learn how, refer to the documentation here.