Microsoft Azure Hardware Security to Help Thwart the World’s 3rd Largest GDP

3
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 System Design
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 System Design

At Hot Chips 2025, Microsoft went into its Azure Hardware Security. The goal is to keep Azure secure since it is a giant cloud service. Microsoft does not just have to protect against external traffic threats, instead it has multi-tenant workloads to keep safe, and some customers want to ensure they are secure from even Azure itself.

Please note, we are covering this live, so please excuse typos.

Microsoft Azure Hardware Security to Help Thwart the World’s 3rd Largest GDP

Having a Hot Chips article with a cheekier title is not something we normally do, but we saw this slide. In terms of world economies, cybercrime now ranks between Germany and China in GDP according to Microsoft’s chart at just over $9T in 2024, and expected to be over $10T in 2025.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Cybercrime 3rd Largest GDP
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Cybercrime 3rd Largest GDP

Microsoft had a bunch of great stats. They have 70+ Azure regions, 400+ data centers, 275K miles of fiber, 190+ network POPs, and 34,000 dedicated security engineers.

As a result, their systems are designed for security as part of the company’s Secure Future Initiative (SFI.)

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Microsoft SFI
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Microsoft SFI

Microsoft is also going into its system architecture. Of note, this looks like a newer retention clip Intel thermal solution with each CPU having 12 DIMM slots. Those 12 DIMM slots are either 6-channel 2DPC or they defy industry convention and use different color locking tabs for alternating channels instead of indicating the first or second DIMM in a channel.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 System Design
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 System Design

Part of this architecture is also the hardware security modules. These can come as PCIe cards or in server and rack mount solutions.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 What Are Hardware Security Modules
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 What Are Hardware Security Modules

In typcial hardware security designs, there is a central HSM cluster.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Typical HSM Architecture
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Typical HSM Architecture

Microsoft is moving its hardware security from the centralized model to being integrated into each server.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Integrated HSM
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Integrated HSM

This is the Azure Integrated HSM which is Microsoft’s security chip. By having a local ASIC, there does not need to be a TLS handshake to a centralized server.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Azure Integrated HSM
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Azure Integrated HSM

Having an in-house chip means that it needs to make the trade-offs in chip design. Previously, when this was centralized, Microsoft would scale the HSM at a cluster level. Now, it needs to size it for a single server, but also keeping it low power and in a small area.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Designing For Scale
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Designing For Scale

Microsoft needs not just AES and PKE crypto acceleration, but also the ability to detect things like intrusion and tampering.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Azure Integrated HSM ASIC
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Azure Integrated HSM ASIC

Microsoft also went into its confidential computing.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Confidential Compute
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Confidential Compute

The idea is to protect data in use especially in multi-tenant cloud environments.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Confidential Computing Protect Data In Use
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Confidential Computing Protect Data In Use

Microsoft is now talking about its Caliptra 2.0 open source silicon root of trust.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Open Silicon Root Of Trust
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Open Silicon Root Of Trust

This is cool. Microsoft is going into the gate count for different features. This is perhaps the most Hot Chips slide we have seen this year.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Caliptra Numbers
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Caliptra Numbers

Here are the verification release gates.

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Caliptra Verification
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Caliptra Verification

Since this is a custom ASIC for Microsoft, the question might be why open source it? Here are Microsoft’s reasons:

Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Why Open Source Silicon
Microsoft Azure Secure Hardware Architecture Hot Chips 2025 Why Open Source Silicon

Overall, this is pretty neat.

Final Words

This was a neat look not just at what Microsoft is doing, but also a but about the “why?” and Microsoft’s philosophy around securing its cloud. Microsoft is more open about this than some other cloud providers, so it is a neat look. If nothing else, learning that the cybercrime market is bigger than the AI market at over $10T and that Microsoft has 34,000 dedicated security folks was neat.

3 COMMENTS

  1. I’m a bit curious what they are up to with the HSM placement.

    If you want more than a TPM will give you for platform-locked identification and encryption purposes an HSM seems like a potentially reasonable choice; but for much of what you would choose HSMs for the fact that they live behind a network abstraction, and can be scaled separately from number of hosts, is a virtue: you want your VMs and containers to be able to move around as needed while still having whatever level of cert access they are supposed to have; and (especially with HSMs doing more of the cryptographic heavy lifting) the relationship between number of certs or number of cryptographic operations per unit time and number of cores or RAM size can vary all over the place, which seems like it would make node-itegrated HSMs vulnerable to being over or undersized.

    I don’t doubt that they have their reasons; but I’d like to know more about how that one works.

  2. While no one knows an actual number – 10T$/yr in cyber crime is an absolute BS.
    Who came up with this nonsense?

  3. I’m guessing that the host based HSM solution works into some kind of loose clustering, allowing for VM relocation without completely breaking the encryption.

    Admittedly, this seems to defeat a lot of the purpose of an HSM, but I can’t see how you could actually maintain uptime if a VM was tied to a single physical host for it’s entire lifecycle.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.