Microsoft has selected Marvell’s LiquidSecurity family of hardware security modules (HSMs) to power its Azure Cloud HSM offering — a move that consolidates Marvell’s role across Azure’s key management portfolio and brings FIPS 140‑3 Level 3‑certified, high‑density PCIe HSMs into Microsoft’s single‑tenant cloud HSM clusters. (prnewswire.com, investor.marvell.com)
Azure Cloud HSM is Microsoft’s single‑tenant, highly available HSM service that gives customers complete administrative control over cryptographic keys and operations inside a dedicated HSM cluster. The service is offered as a managed cluster that Microsoft runs and maintains while the customer retains administrative control of keys, and it meets FIPS 140‑3 Level 3 validation — a strict hardware security certification required by many government and financial customers. (learn.microsoft.com)
Marvell’s LiquidSecurity line — delivered as compact PCIe cards powered by Marvell’s OCTEON DPUs — was explicitly designed to convert the traditional, appliance‑style HSM into a dense, cloud‑optimized device. Marvell and Microsoft have worked together for years: LiquidSecurity cards already power Azure Key Vault and Azure Key Vault Managed HSM services, and the new announcement extends that relationship to Azure Cloud HSM clusters. (investor.marvell.com, marvell.com)
In addition to vendor and product communications, community archives and internal briefings shared with platform operators highlight a broader Azure strategy to integrate hardware security closer to the host, reduce cryptographic latency, and accelerate confidential computing use cases — trends that align with the Marvell selection.
For Marvell, the endorsement from Microsoft is strategically useful as it promotes LiquidSecurity across a large installed base and supports Marvell’s pivot to hyperscale infrastructure. For Microsoft customers, the expanded use of LiquidSecurity in Azure Cloud HSM should offer broader compliance coverage and improved throughput for cryptographic workloads — provided they validate operational and governance details for their specific use cases. (investor.marvell.com, prnewswire.com)
At the same time, the decision comes with practical and strategic risks: supply‑chain dependence on a single vendor for a foundational security element; the need to maintain cryptographic agility as algorithms and threats evolve; and the perennial operational caveat that device certification is necessary but not sufficient for overall key lifecycle security. Customers and security architects should treat vendor certifications as one component of a broader security and governance program, validate Azure’s operational specifics for Cloud HSM, and insist on detailed migration and incident response commitments.
For enterprises under strict compliance regimes, the new option opens a realistic path to migrate sensitive HSM workflows to the cloud without sacrificing certifications like FIPS 140‑3 Level 3 or regionally relevant eIDAS trust requirements. For the market, it accelerates the shift to HSM services as a mainstream cloud primitive rather than a niche appliance purchase. Expect continued competition in HSM hardware and cloud integrations as other vendors and hyperscalers respond with their own validated modules, feature roadmaps for quantum‑safe transitions, and service variations that balance multi‑tenant economics with the highest levels of assurance. (techcommunity.microsoft.com, prnewswire.com)
Microsoft and Marvell’s announcement is consequential for anyone designing cryptographic infrastructure at scale: it reduces a major barrier to cloud migration for regulated workloads, tightens the intersection between hardware validation and cloud services, and shifts more of the HSM value chain into managed, hyperscale operations. The benefits are tangible — but they must be weighed against supply‑chain, vendor dependency, and long‑term cryptographic agility concerns as organizations modernize their key management architectures.
Source: Investing.com https://www.investing.com/news/company-news/microsoft-selects-marvells-liquidsecurity-hsms-for-azure-cloud-hsm-93CH-4197821/
Background
Azure Cloud HSM is Microsoft’s single‑tenant, highly available HSM service that gives customers complete administrative control over cryptographic keys and operations inside a dedicated HSM cluster. The service is offered as a managed cluster that Microsoft runs and maintains while the customer retains administrative control of keys, and it meets FIPS 140‑3 Level 3 validation — a strict hardware security certification required by many government and financial customers. (learn.microsoft.com)Marvell’s LiquidSecurity line — delivered as compact PCIe cards powered by Marvell’s OCTEON DPUs — was explicitly designed to convert the traditional, appliance‑style HSM into a dense, cloud‑optimized device. Marvell and Microsoft have worked together for years: LiquidSecurity cards already power Azure Key Vault and Azure Key Vault Managed HSM services, and the new announcement extends that relationship to Azure Cloud HSM clusters. (investor.marvell.com, marvell.com)
In addition to vendor and product communications, community archives and internal briefings shared with platform operators highlight a broader Azure strategy to integrate hardware security closer to the host, reduce cryptographic latency, and accelerate confidential computing use cases — trends that align with the Marvell selection.
What Marvell’s LiquidSecurity brings to Azure Cloud HSM
Density and throughput engineered for cloud scale
LiquidSecurity cards are built for hyperscale environments and make a different tradeoff from traditional 1U/2U HSM appliances. Marvell’s published specifications for LiquidSecurity2 show capacity and throughput figures that are noteworthy for cloud operators:- A single LiquidSecurity2 PCIe card can manage up to 100,000 pairs of encryption keys.
- It can process more than one million cryptographic operations per second on a single card. (investor.marvell.com, marvell.com)
FIPS 140‑3 Level 3 certification and compliance reach
Marvell’s LiquidSecurity 1 and 2 modules achieved NIST FIPS 140‑3 Level 3 certification, which adds a physical tamper‑resistance and secure key handling layer required by many regulated customers. Microsoft’s Azure Cloud HSM uses FIPS‑validated modules to meet compliance requirements for customers in finance, government, and regulated industries. The certification opened the door for Azure to offer single‑tenant, FIPS‑validated HSM clusters built on Marvell hardware. (investor.marvell.com, learn.microsoft.com)Cloud model and multi‑tenant efficiency
LiquidSecurity cards are designed to be cloud native — PCIe form factor, DPU acceleration, and hardware partitioning that support dense multi‑tenant operation. The architecture enables cloud providers to host many isolated HSM partitions per card, reducing per‑customer cost while preserving key separation and administrative isolation.Broader certifications (eIDAS) and regional compliance
Microsoft has also worked with Marvell to validate LiquidSecurity devices against European trust frameworks; recent Microsoft announcements show Azure Managed HSM and Premium Key Vault devices using Marvell adapters have been certified for eIDAS under certain schemes. This addresses European signature and trust service requirements for qualified electronic signatures. (techcommunity.microsoft.com)Why this matters to enterprises and cloud architects
Performance and latency improvements
Embedding high‑throughput HSM cards into Azure Cloud HSM clusters addresses a typical cloud tradeoff: centralized network‑attached HSMs add network latency, while host‑attached HSM functionality keeps crypto operations close to workloads. Marvell’s PCIe cards, combined with Azure’s cluster design and private link access, reduce cryptographic round‑trip time and enable higher transaction volumes for services such as TLS offload, certificate authorities, code signing, and PKI operations. This is particularly relevant for high‑frequency, low‑latency workloads like payment gateways and high‑throughput database encryption. (marvell.com, learn.microsoft.com)Compliance and regulatory reach
With FIPS 140‑3 Level 3 certification and eIDAS validations in the mix, Azure can present a stronger compliance posture for customers who must meet strict cryptographic device standards. This expands cloud viability for workloads that historically required on‑premises HSM appliances — banks, payment processors, government agencies, and digital‑signature providers now have a managed cloud path that aligns with regulatory rules. (investor.marvell.com, techcommunity.microsoft.com)Cost, density, and operational simplicity
From a procurement and operations perspective, the move allows Azure to offer HSM‑as‑a‑service with improved density and lower per‑operation cost. Cloud providers can consolidate capacity, reduce rack utilization, and lower power and cooling demands — efficiencies that typically get passed to enterprise customers through more affordable and elastic HSM offerings. Marvell’s cards were engineered with those economics in mind. (marvell.com)Market context and financial implications
HSM‑as‑a‑service market growth
Market forecasts referenced in vendor materials and Microsoft/PR communications indicate the HSM‑as‑a‑service market is expected to grow strongly over the coming years; one cited projection places annual growth at roughly 8.5% through 2029, reflecting expansion in cloud cryptography demand. That macro growth supports the commercial case for hyperscalers investing in compact, high‑throughput HSM hardware. (prnewswire.com)Marvell’s strategic positioning and corporate moves
Marvell has been reshaping its business toward data‑center and custom silicon opportunities, and the Azure selection is a tangible endorsement of that strategy. The company completed a high‑profile divestiture of its Automotive Ethernet business to Infineon for $2.5 billion in 2025, a move that concentrates Marvell’s focus and capital on hyperscale and AI infrastructure efforts. Separately, Marvell strengthened its board with the appointment of Rajiv Ramaswami, bringing additional leadership and cloud‑software expertise to the company. These corporate events underline Marvell’s pivot toward cloud infrastructure leadership. (marvell.com, investor.marvell.com)Wall Street and analyst signals (context and caution)
Investor research and industry commentary — frequently summarized by services such as InvestingPro and mainstream financial outlets — point to bullish expectations for Marvell’s revenue trajectory, with some forecasts in recent reporting pointing at large year‑over‑year growth percentages driven by data‑center and AI programs. Those figures reflect analyst models and are sensitive to customer ramps, supply chain conditions, and macro demand; therefore, they should be interpreted as forward‑looking estimates rather than guarantees. (uk.investing.com, investing.com)Technical analysis: strengths and limitations
Strengths
- High throughput per card: >1M ops/sec per card gives hyperscalers the ability to consolidate many customer workloads onto fewer physical devices, improving utilization and TCO. (investor.marvell.com)
- FIPS 140‑3 Level 3 validation: meets a strict regulatory bar for customers requiring hardware tamper protection and secure key storage. (investor.marvell.com, learn.microsoft.com)
- Cloud‑native form factor: PCIe deployment reduces space and power overhead compared with 1U or 2U appliances, beneficial in dense server racks. (marvell.com)
- Prior integration pedigree: LiquidSecurity already underpins Azure Key Vault and Managed HSM, reducing integration risk for Azure Cloud HSM rollout. (investor.marvell.com)
Limitations and important caveats
- Certification scope: FIPS 140‑3 Level 3 validates hardware security for specific cryptographic modules and modes. It does not obviate the need for holistic operational security controls, secure key lifecycle management, or customer governance practices. Relying solely on a validated HSM does not substitute for secure key management policies or access governance.
- Supply chain and component risk: Hyperscalers depend on steady hardware supply and vendor stability. Any disruption in Marvell’s production or a wider semiconductor supply shock could impact Azure’s ability to scale HSM capacity in specific regions. The sale of non‑core assets and shifting business focus increases efficiency but also concentrates Marvell’s exposure to data‑center markets; this is strategically rational but operationally material. (marvell.com, investor.marvell.com)
- Vendor and platform dependency: Deep integration of custom HSM hardware into a cloud provider’s platform can create implicit lock‑in effects — customers moving to another cloud or seeking on‑prem parity will need to reconcile differences in HSM architectures and supported features.
- Cryptographic agility and future threats: Hardware HSMs have long hardware lifecycles. Ensuring agility for new algorithms (including post‑quantum cryptography) requires firmware, software, and sometimes hardware updates. Claims of “quantum readiness” should be validated for specific algorithms and migration paths; customers should demand clear timelines and cryptographic migration plans from both cloud and hardware vendors. Some vendor materials discuss quantum‑resilient pathways, but these are typically multi‑year programs and must be validated in practice.
Security risk analysis — what to watch for
- Supply‑chain provenance and verification
Hardware trust depends on verified manufacturing, secure boot chains, and firmware integrity processes. Enterprises with the highest assurance requirements should probe how Azure and Marvell attest to provenance, how firmware upgrades are delivered and verified, and how the vendor responds to potential vulnerabilities. - Multi‑tenant partition isolation
While LiquidSecurity is designed for dense multi‑tenant use, every multi‑tenant system introduces potential side‑channel and resource‑contention vectors. Azure’s single‑tenant Cloud HSM clusters ameliorate many risks, but customers must ensure that partitioning and administrative boundaries meet their threat model. - Operational transparency and key custody models
Azure Cloud HSM gives customers administrative control of keys, but customers must confirm that key export policies, key escrow arrangements, and backup/restore mechanics align with their compliance needs. Ask for clear documentation of key ownership models and cryptographic domain separation. - Incident response and disclosure SLAs
When a hardware or firmware vulnerability emerges, customers need fast, transparent remediation windows. Large cloud providers typically publish security advisories and patch schedules, but the responsiveness of hardware vendors matters greatly for critical crypto infrastructure.
Practical guidance for IT, security, and compliance teams
- Evaluate requirement fit: map workloads that currently require on‑premises HSMs (e.g., payment processing, CAs, document signing) and document regulatory controls that mandate hardware FIPS 140‑3 Level 3 devices.
- Validate Azure's implementation: confirm the Cloud HSM cluster topology, private link access, backup/restore procedures, and key‑export policies for your tenant.
- Perform workload testing: run representative signing, encryption, and TLS offload workloads to measure latency, throughput, and operational behavior under peak loads.
- Audit cryptographic algorithms and lifecycles: inventory algorithms in use, confirm support for your required key sizes and modes, and demand a vendor roadmap for post‑quantum migration if relevant.
- Negotiate operational SLAs: include patching windows, vulnerability disclosure obligations, and incident escalation processes in procurement or cloud subscription agreements.
- Maintain crypto agility: plan key rotation and migration processes so that migrations can be executed without prolonged outages if hardware or algorithms change.
Strategic implications for the cloud and HSM market
This move by Microsoft and Marvell signals a larger industry dynamic: cloud providers want hardware placards that combine the performance of locally attached cryptographic engines with the administrative guarantees of dedicated HSM clusters. The choice of compact, high‑density HSM cards supports an economics‑driven wave of “HSM‑as‑a‑service” expansion, enabling more customers to consume hardware‑backed cryptography on demand rather than buying and maintaining expensive appliances.For Marvell, the endorsement from Microsoft is strategically useful as it promotes LiquidSecurity across a large installed base and supports Marvell’s pivot to hyperscale infrastructure. For Microsoft customers, the expanded use of LiquidSecurity in Azure Cloud HSM should offer broader compliance coverage and improved throughput for cryptographic workloads — provided they validate operational and governance details for their specific use cases. (investor.marvell.com, prnewswire.com)
Concluding analysis — strengths, risks, and what to expect next
The selection of Marvell’s LiquidSecurity HSMs for Azure Cloud HSM is a pragmatic alignment of hyperscaler requirements and semiconductor innovation: it pairs Azure’s need for dense, compliant HSM capacity with Marvell’s PCIe‑based, DPU‑accelerated modules designed for cloud economics. This fosters improved performance, expanded compliance options for regulated customers, and lower per‑operation cost for cryptographic services. (investor.marvell.com, learn.microsoft.com)At the same time, the decision comes with practical and strategic risks: supply‑chain dependence on a single vendor for a foundational security element; the need to maintain cryptographic agility as algorithms and threats evolve; and the perennial operational caveat that device certification is necessary but not sufficient for overall key lifecycle security. Customers and security architects should treat vendor certifications as one component of a broader security and governance program, validate Azure’s operational specifics for Cloud HSM, and insist on detailed migration and incident response commitments.
For enterprises under strict compliance regimes, the new option opens a realistic path to migrate sensitive HSM workflows to the cloud without sacrificing certifications like FIPS 140‑3 Level 3 or regionally relevant eIDAS trust requirements. For the market, it accelerates the shift to HSM services as a mainstream cloud primitive rather than a niche appliance purchase. Expect continued competition in HSM hardware and cloud integrations as other vendors and hyperscalers respond with their own validated modules, feature roadmaps for quantum‑safe transitions, and service variations that balance multi‑tenant economics with the highest levels of assurance. (techcommunity.microsoft.com, prnewswire.com)
Microsoft and Marvell’s announcement is consequential for anyone designing cryptographic infrastructure at scale: it reduces a major barrier to cloud migration for regulated workloads, tightens the intersection between hardware validation and cloud services, and shifts more of the HSM value chain into managed, hyperscale operations. The benefits are tangible — but they must be weighed against supply‑chain, vendor dependency, and long‑term cryptographic agility concerns as organizations modernize their key management architectures.
Source: Investing.com https://www.investing.com/news/company-news/microsoft-selects-marvells-liquidsecurity-hsms-for-azure-cloud-hsm-93CH-4197821/