Store your keys and your firmware within the secure parameter of a dedicated Hardware Security Module (HSM) under your sole control and away from your Cloud Service Provider:
In an effort to concentrate on their core competencies, companies are increasingly moving towards external cloud-delivered IT services.
What drives this strategy is usually at least one of the following 2 factors:
Per consequence, many companies recognize the need to protect their data and assets in the cloud by using encryption.
Keep the keys safe and separate – in a Hardware Security Module – separate from the Cloud Service Providers: