An anti-tamper hardware security device that communicates with a host machine, including a host interface coupled to the host machine and configured to receive an access request from the host machine, the access request being associated with an application; a key manager configured to manage cryptographic keys; a whitelist manager configured to manage application validation information; and a controller configured to receive the access request from the host interface, validate the application using the application validation information, retrieve a cryptographic key associated with the application, and transmit a response to the host machine through the host interface if the controller determines that the application is valid.