A Yubico first…introducing the YubiHSM 2 FIPS

Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why today we’ve not only launched the YubiKey 5 FIPS Series but also the smallest FIPS-validated hardware security module (HSM) in the world, the YubiHSM 2 FIPS. The YubiHSM 2 FIPS meets FIPS 140-2, Level 3.

While the YubiHSM 2 launched in 2017, there’s never been a FIPS-validated version of the product. Now, our high-risk customers can achieve and maintain compliance while getting the same security benefits as other YubiHSM users. These include advanced protection for certificate authority (CA) keys, database master keys, code signing, authentication/access tokens, manufacturing processes and component authenticity checks, IoT gateways or proxies, file encryption, cryptocurrency exchanges, and more.

While credential theft and phishing attacks continue to skyrocket, so do the number of server-based attacks. Approximately 95% of all IT breaches happen when a user credential or server gets hacked — a fact reinforced by the dizzying array of breaches to hit news headlines within the past year. And with 53% of all respondents from our study with 451 Research saying they’ve experienced a security incident or breach in the past year, the need for strong security across an organization’s entire infrastructure becomes even more clear.

The rise of threats like zero-day exploits and malware, makes software-based cryptographic key storage increasingly vulnerable for organizations. Alternatively, HSMs offer advanced protection, backed by tamper-resistant hardware, for servers and the cryptographic keys stored within them. 

Clearly, we’re big fans of the YubiHSM 2 FIPS. But if it wasn’t clear why you should also be a fan, here are some more reasons:

  • Secure hardware protection for cryptographic keys

The YubiHSM 2 FIPS enables secure key storage and operations on tamper-resistant hardware, with audit logging. This prevents accidental copying and distribution of keys, and remote theft of cryptographic software keys. Extensive cryptographic capabilities include: hashing, key wrapping, asymmetric signing, decryption, attestation and more. 

  • Innovative design for flexible use and simple deployment

Traditional rack-mounted and card-based HSMs are not practical for many organizations due to their size and deployment complexity. The YubiHSM 2 FIPS offers a portable ‘nano’ form factor that allows fast and flexible deployment across diverse environments. It fits easily into a USB-A slot, lying almost flush to remain concealed. 

  • Low-cost, high security ROI

The YubiHSM 2 FIPS delivers government-grade high cryptographic security and operations at a price point that is up to 90% cheaper than traditional HSMs. Additionally, low-power usage reduces business energy consumption. 

For more information on YubiHSM 2 FIPS, please visit the Yubico site. It is also available for purchase on the Yubico store, through Yubico’s dedicated sales team, or from any Yubico-approved channel partners and resellers

Talk to our teamTalk to our team

Share this article:


  • Digital security’s unique role in protecting our environmentAs sustainability expands to include social, economic, and technological challenges, cybersecurity has emerged as a top global threat – with cybercrime projected to cost $12 trillion this year. Stolen credentials and phishing account for 80% of breaches. At Yubico, making the world more secure is just part of how we care for the world around […]Read moreCSREarth DaySecure It ForwardSustainability
  • Breaking down Australia’s plan to combat AI-driven phishing scamsAcross Australia, cybercrime continues to be a major challenge impacting businesses, critical infrastructure and consumers alike. The use of AI by bad actors across the spectrum of cybercrime is on the rise, and as a result, credential phishing scams are becoming increasingly sophisticated. AI is effectively helping to lower the cost of phishing and increase […]Read moreAIAPACAustraliaphishing
  • 5 fast cybersecurity tips to clean up your digital lifeWith today being Identity Management Day, now is the perfect time to take stock of your online presence, update security settings, and ensure that your personal data remains protected from cyber threats like phishing. We’re also seeing increasing concerns of DeepSeek and other AI tools around data privacy making these kinds of attacks more successful […]Read morebest practices
  • Navigating the PCI DSS 4.0 transition and meeting compliance with phishing-resistant YubiKeysIn just a few days, on March 31, 2025, decision makers in industries that involve payment processing – including financial services, retail & hospitality and telecommunications – are tasked to finalize the transition to Payment Card Industry Data Security Standard (PCI DSS) 4.0. This deadline marks a critical juncture for all organizations handling payment card […]Read moreNISTPCI DSSPCI DSS 4.0