If TLS is disabled on a network-attached Hardware Security Module (HSM), but the device still enforces:
- IP-based access control (only whitelisted client IPs can connect), and
- PKCS#11 slot PIN authentication (required before using keys in a slot/partition),
how secure does the setup remain?
Specifically:
Active attacks: Could an attacker on the network still send commands to the HSM (e.g., making it sign arbitrary data) despite IP ACLs and slot PIN protection?
Passive attacks: Without TLS, is the traffic between the client and the HSM (including decryption requests and their plaintext responses) visible to an eavesdropper?
Compliance: If the network is already isolated and considered protected, would PCI DSS or similar standards still require TLS (or equivalent encryption in transit), or could this configuration be acceptable under those conditions?
In other words: If the network is already assumed to be secure, does it make sense to rely only on IP ACLs and PKCS#11 PINs instead of TLS? Or is there little justification for this setup — since if the network were truly that trustworthy, the rationale for using an HSM in the first place would be questionable?