As of Vault 1.10.3, HashiCorp publishes FIPS-certified binaries suffixed with
-fips that do not require an HSM.
What Is Seal Wrapping?
Seal wrapping encrypts Vault’s ciphertext a second time with HSM-managed keys, enabling Vault in high-security environments (PCI, HIPAA, DoD, NATO). By combining:- AES-256 encryption by Vault’s master key
- Secondary HSM encryption
Default Seal-Wrapped Data
Vault seal-wraps the most sensitive assets by default:
| Resource | Description |
|---|---|
| Recovery Key | Master recovery key shares |
| Stored Shares | All encrypted key shares |
| Root Key | Primary root token key |
| Keyring | Internal cryptographic keyring |
Configuring Seal Wrapping
Seal wrapping is on by default for supported HSM seals. To disable it (trading security for a slight performance boost):Disabling seal wrapping reduces your security posture. Only disable if HSM double-encryption is not required.

Enabling Seal Wrapping on a Secrets Engine
When mounting a secrets engine, enable HSM seal wrapping with-seal-wrap (CLI) or seal_wrap = true (HCL):
| Path | Plugin | Seal Wrap |
|---|---|---|
| cubbyhole/ | cubbyhole | false |
| identity/ | identity | false |
| kv/ | kv | true |