Skip to main content
NEW · APP STORE Now on iOS · macOS · iPad Android & Windows soon GET IT
Prompts Hardware Security Module PKCS#11 Integration

agent security skill risk: medium

Hardware Security Module PKCS#11 Integration

The prompt provides an overview, prerequisites, and numbered steps for integrating HSMs via the PKCS#11 interface in Python, covering slot enumeration, key generation, signing, obj…

  • Policy sensitive
  • Human review
  • External action: medium

SKILL 4 files · 2 folders

SKILL.md
---
name: performing-hardware-security-module-integration
description: "Integrate Hardware Security Modules (HSMs) using PKCS#11 interface for cryptographic key management, signing"
---
# Performing Hardware Security Module Integration

## Overview

Hardware Security Modules (HSMs) provide tamper-resistant cryptographic key storage and operations. This skill covers integrating with HSMs via the PKCS#11 standard interface using python-pkcs11, performing key generation, signing, encryption, and verification operations, querying token and slot information, and validating HSM configuration for compliance with FIPS 140-2/3 requirements.


## When to Use

- When conducting security assessments that involve performing hardware security module integration
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing

## Prerequisites

- HSM device or software HSM (SoftHSM2 for testing)
- PKCS#11 shared library (.so/.dll) for the HSM vendor
- Python 3.9+ with `python-pkcs11`
- Token initialized with SO PIN and user PIN
- For AWS CloudHSM: `cloudhsm-pkcs11` provider configured

## Steps

1. Load PKCS#11 library and enumerate available slots and tokens
2. Open session and authenticate with user PIN
3. Generate RSA 2048-bit or EC P-256 key pairs on the HSM
4. Perform signing and verification using on-device keys
5. List all objects (keys, certificates) stored on the token
6. Query mechanism list to verify supported algorithms
7. Generate compliance report with key inventory and algorithm audit

## Expected Output

- JSON report listing HSM slots, tokens, stored keys, supported mechanisms, and compliance status
- Signing test results with key metadata and algorithm details

REQUIRED CONTEXT

  • HSM device or SoftHSM2
  • PKCS#11 shared library
  • Python 3.9+ with python-pkcs11
  • initialized token with PINs

OPTIONAL CONTEXT

  • AWS CloudHSM configuration

EXPECTED OUTPUT

Format
json
Schema
json_schema · HSM slots, tokens, stored keys, supported mechanisms, compliance status, Signing test results
Constraints
  • include HSM slots, tokens, stored keys, supported mechanisms, compliance status
  • include signing test results with key metadata

SUCCESS CRITERIA

  • Produce JSON report listing HSM slots, tokens, stored keys, supported mechanisms, and compliance status
  • Include signing test results with key metadata and algorithm details

CAVEATS

Dependencies
  • HSM device or software HSM (SoftHSM2 for testing)
  • PKCS#11 shared library (.so/.dll) for the HSM vendor
  • Python 3.9+ with `python-pkcs11`
  • Token initialized with SO PIN and user PIN
  • For AWS CloudHSM: `cloudhsm-pkcs11` provider configured

QUALITY

OVERALL
0.65
CLARITY
0.90
SPECIFICITY
0.75
REUSABILITY
0.30
COMPLETENESS
0.80

IMPROVEMENT SUGGESTIONS

  • Add input placeholders (e.g., {{library_path}}, {{pin}}) to support templated reuse across different HSM setups

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR AGENT