agent security skill risk: medium
Hardware Security Module PKCS#11 Integration
The prompt provides an overview, prerequisites, and numbered steps for integrating HSMs via the PKCS#11 interface in Python, covering slot enumeration, key generation, signing, obj…
- Policy sensitive
- Human review
- External action: medium
SKILL 4 files · 2 folders
SKILL.md
--- name: performing-hardware-security-module-integration description: "Integrate Hardware Security Modules (HSMs) using PKCS#11 interface for cryptographic key management, signing" --- # Performing Hardware Security Module Integration ## Overview Hardware Security Modules (HSMs) provide tamper-resistant cryptographic key storage and operations. This skill covers integrating with HSMs via the PKCS#11 standard interface using python-pkcs11, performing key generation, signing, encryption, and verification operations, querying token and slot information, and validating HSM configuration for compliance with FIPS 140-2/3 requirements. ## When to Use - When conducting security assessments that involve performing hardware security module integration - When following incident response procedures for related security events - When performing scheduled security testing or auditing activities - When validating security controls through hands-on testing ## Prerequisites - HSM device or software HSM (SoftHSM2 for testing) - PKCS#11 shared library (.so/.dll) for the HSM vendor - Python 3.9+ with `python-pkcs11` - Token initialized with SO PIN and user PIN - For AWS CloudHSM: `cloudhsm-pkcs11` provider configured ## Steps 1. Load PKCS#11 library and enumerate available slots and tokens 2. Open session and authenticate with user PIN 3. Generate RSA 2048-bit or EC P-256 key pairs on the HSM 4. Perform signing and verification using on-device keys 5. List all objects (keys, certificates) stored on the token 6. Query mechanism list to verify supported algorithms 7. Generate compliance report with key inventory and algorithm audit ## Expected Output - JSON report listing HSM slots, tokens, stored keys, supported mechanisms, and compliance status - Signing test results with key metadata and algorithm details
REQUIRED CONTEXT
- HSM device or SoftHSM2
- PKCS#11 shared library
- Python 3.9+ with python-pkcs11
- initialized token with PINs
OPTIONAL CONTEXT
- AWS CloudHSM configuration
EXPECTED OUTPUT
- Format
- json
- Schema
- json_schema · HSM slots, tokens, stored keys, supported mechanisms, compliance status, Signing test results
- Constraints
- include HSM slots, tokens, stored keys, supported mechanisms, compliance status
- include signing test results with key metadata
SUCCESS CRITERIA
- Produce JSON report listing HSM slots, tokens, stored keys, supported mechanisms, and compliance status
- Include signing test results with key metadata and algorithm details
CAVEATS
- Dependencies
- HSM device or software HSM (SoftHSM2 for testing)
- PKCS#11 shared library (.so/.dll) for the HSM vendor
- Python 3.9+ with `python-pkcs11`
- Token initialized with SO PIN and user PIN
- For AWS CloudHSM: `cloudhsm-pkcs11` provider configured
QUALITY
- OVERALL
- 0.65
- CLARITY
- 0.90
- SPECIFICITY
- 0.75
- REUSABILITY
- 0.30
- COMPLETENESS
- 0.80
IMPROVEMENT SUGGESTIONS
- Add input placeholders (e.g., {{library_path}}, {{pin}}) to support templated reuse across different HSM setups
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity