All Products
Search
Document Center

Key Management Service:SSL offloading through HSM

Last Updated:Mar 31, 2026

Hardware Security Module (HSM) supports SSL offloading, which moves SSL/TLS negotiation and encryption/decryption operations from your application servers to HSM — reducing server CPU load and centralizing private key management under tamper-resistant hardware.

What is SSL offloading

SSL offloading transfers SSL/TLS encryption and decryption from application servers to a dedicated device. Backend servers receive only decrypted plaintext requests, freeing up CPU resources. Certificates and private keys are managed centrally on the offloading device, so you no longer need to install certificates on each server individually.

When to use SSL offloading through HSM

SSL offloading through HSM is a good fit for:

  • High-traffic HTTPS services: websites and API services where TLS processing creates a CPU bottleneck on application servers

  • Regulated industries: finance and healthcare environments that require centralized control, auditing, and physical protection of private keys

Security

HSM provides the following security guarantees for SSL offloading:

  • Internal network isolation: HSM communicates with backend servers through a Virtual Private Cloud (VPC), keeping traffic off the public internet.

  • Physical key protection: Private keys are always stored in tamper-resistant HSM hardware. Even if the device is physically compromised, attackers cannot export or replicate the keys.

  • Centralized access control: HSM manages all certificate private keys in one place and enforces role-based access using roles such as administrator and operator.

  • High availability: HSM supports cluster deployment to meet load balancing and disaster recovery requirements.

Compliance

  • Algorithm compliance: HSM meets the requirements of national cryptography laws.

  • Audit logging: HSM generates detailed logs recording the timestamp, operation type, and other information for each private key usage, supporting audit requirements.

Typical deployment

The following figure shows a typical SSL offloading deployment on Alibaba Cloud Elastic Compute Service (ECS).

image

The deployment involves three components:

ComponentRole
Nginx proxyHandles TLS handshakes with clients
TASSL engineBridges Nginx and HSM, forwarding cryptographic operation requests to HSM through standard interfaces such as PKCS#11
HSM instance management toolInitializes HSM and creates keys

How it works

When a client connects over HTTPS, the TLS handshake proceeds as follows:

  1. The client establishes a TCP connection with Nginx and initiates a TLS handshake.

  2. When Nginx needs a private key for TLS authentication, it sends the operation request to HSM through the TASSL engine.

    The private key is always stored in HSM and will not be loaded into the memory of the Nginx server.
  3. HSM performs the required decryption and signing operations and returns the results to the TASSL engine.

  4. Nginx completes the TLS handshake using the results from HSM.

  5. The encrypted channel is established. Nginx decrypts subsequent requests into plaintext and forwards them to the backend service.