Skip to main content

Securosys365 - Definitions

Tenant

A tenant is the top-level container for managing cryptographic keys. It typically represents an entire organization rather than an individual. Each key, vault, and application in Securosys365 belongs to exactly one tenant. Tenants are completely isolated from each other.

⚠️ Important: Keys, vaults, and applications cannot be moved between tenants. Multiple tenants are possible if you're certain that objects won't need to be shared or moved across them.

Organization Unit

An Organization Unit in Securosys365 corresponds to a business unit or department within a tenant. It represents a subdivision of an organization and is not tied to any specific user. Each vault belongs to one organization unit. Like tenants, organizations are isolated from each other.

✅ Note: Unlike tenants, vaults and applications can be reassigned between different organization units. Therefore, you can create multiple organizations within a tenant more flexibly.

Users

Users are identified by their email addresses. A single user can belong to one or more organization units within a tenant.

For example, an employee may belong to:

  • A production organization unit
  • A testing organization unit
  • A personal development account

Depending on the user's role and assigned permissions, they can:

  • Manage users and vaults
  • Create keys
  • Modify key properties
  • Review activity logs

🔐 Note: Users cannot perform cryptographic operations themselves—only registered applications can execute those operations.

Roles

Securosys365 comes with a set of predefined roles per tenant, which can be customized independently to suit organizational needs:

RoleDescription
DKE-ServicesUsed by the DKE Web Service (e.g., Microsoft 365 Office Applications) to perform cryptographic operations. This role is limited to operational use and cannot perform administrative tasks such as user management or Vault access configuration.
Securosys365 – HostReserved for Securosys personnel responsible for tenant-level administration and support.
Securosys365 – Tenant AdminCustomer administrator, has administrative rights within the tenant. This role can access the Securosys365 DKE Cockpit, create DKE Keys and Web Services, and manage users and groups.
Securosys365 – AuditorA read-only role with access to view keys, services, and audit/activity logs. Ideal for compliance or monitoring purposes.

Keys

A Key is stored within a Securosys CloudHSM Partition (Vault) and represents either a symmetric key or an asymmetric key pair. For asymmetric keys, both the private and public components are stored together in a single Key object. In some cases, such as when generating an RSA key in an HSM, a Key may contain only a public key without an associated private key.

Each Key belongs to exactly one Vault. Access to a Key is governed by the permissions assigned to the Vault it resides in. Users and applications that have access to the Vault can view and operate on its Keys.

🔐 Note: Users or applications not assigned to the Vault cannot see or interact with its Keys. For more details, see the Authorization section.

Key States

The Key states conforms with NIST SP800-57 - Recommendation for Key Management - Chapter 7 Key States and Transitions

StateDescription
PreActiveKey is generated on the HSM but is not yet active. If a Activation time constraint is given. If the action time is reached the key will automatically receive the state Active based on the timezone settings (default: W. Europe Standard Time).
ActiveThe key can be used for cryptographic operations and is the default state.
DeactiveKey cannot be used for new encrypt operations but still needed to decrypt (e.g. old encrypted files)
CompromisedKey known or suspected to be compromised. This key should never be used again (thus you cannot reactivate this key, once it is compromised). Generally, keys are compromised when they are provided to or determinded by an unauthorized entity.
warning

Important:: Keys which are in state Deactivated or Compromised cannot be re-activated!

reference: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf - Chapter 7 Key States and Transitions

Vaults

A Vault is a logical container for grouping related Keys. All Keys in a Vault inherit the same Access Policies and Approval Policies, which are defined at the Vault level.

  • Multiple users and applications can be granted access to a Vault.
  • Vaults serve as the security boundary for key access and operations.
  • By default, Securosys is setting up at least one dedicated vault (KeyStore) on a CloudHSM Partition for each Tenant. If more vaults are needed, please contact your sales representative, or open a request on the Securosys Support Portal.

Apps (DKE Web Service)

An Application refers to a non-human client—such as a service, daemon, or background process—that interacts with Securosys 365. Applications (Mircosoft365 Office Applications) authenticate to Securosys365 using either:

  • An API key (secret token)

Depending on assigned permissions, applications can:

  • Create Keys
  • Modify Key properties
  • Perform cryptographic operations using Keys

⚠️ Note: Applications cannot perform administrative tasks such as managing users or assigning access to Vaults.

An application can be assigned to one or more Vaults. Once assigned, it gains permission to operate on all Keys within those Vaults.

Conditional Access Policy (Authorization)

Conditional Access Policy enables fine-grained authorization for operations on entities such as Vaults, Keys, and Applications (Apps).

Starting from version 1.0, Securosys365 supports detailed access controls that define what actions an App can perform within each organization unit it is associated with. An App is linked to a Vault, which in turn is linked to one or more organization units.

In addition to assigning specific Key Operations to security objects, administrators can assign operation-level permissions to groups that an App belongs to.

When an App interacts with a Vault or Key, the following security controls apply:

  • Quorum Control (coming soon) – Allows enforcement of multi-party approvals.
  • Role-Based Access Control (RBAC) – App permissions are defined via roles assigned to it.
  • Conditional Access Policies – Fine-tuned rules that govern what the App can do, based on its context and assigned permissions.
  • Status Control – Apps can be explicitly enabled or disabled, impacting their ability to perform operations.

Conditional Access Policy

The fine-grained authorization model in Securosys365 is inspired by Microsoft Azure Conditional Access Policies. These policies operate on simple if-then logic:

If a user or application attempts to access a resource (such as a Vault, App, or Key), Then specific conditions must be met—for example, requiring multi-factor authentication (MFA).

Commonly Applied Conditional Access Policies

Here are some widely used policies that organizations implement:

  • Require MFA for users in administrative roles
  • Enforce MFA for high-impact operations, such as editing or deleting sensitive data
  • Block access from unregistered or unmanaged devices (Device Trust)
  • Require access from trusted network locations for DKE365 encryption/decryption
  • Restrict or allow access based on geographic location
  • Block access based on risky sign-in behaviors, such as impossible travel or anonymized IPs