This section provides guidance on how to use Hardware Security Modules (HSMs) to keep root
keys offline. Other keys can also be kept offline to enhance security further, such as the targets
and bins
keys.
It is inspired by the Python Software Foundation’s TUF key generation and signing ceremonies runbook and is based on requirements for securely managing offline keys as outlined in PEP-458.
This document is designed to be read as a runbook – a collection of discrete instructions with remediation steps that, if followed correctly, should result in the intended effects.
We use the following notation:
This document uses RFC 2119 to describe optional and mandatory steps.