Dear members,
This is a reminder of tomorrow's Key Mgmt working group call scheduled to take place (Wednesday, June 12th) at 09:00 a.m. PT / 12:00 p.m. ET / 16:00 GMT.
Agenda:
Document 1 - Best Practices when Migrating:
- Sunil @Sunil Arora to connect with Yuvaraj and identify the updated sections of 2 and 3 and 4.4 OR make the review and verification of this action independently if possible.
- Sections 1 and 2 update by Partha.
- Michael ( @Michael Roza) to Concise section 4.1 and 4.2 on key points. Too many examples: perhaps using less is possible.
- Phani ( @@Phanikumar Kancharla) to review and provide feedback/comments at the paper's content. (If this action item is not implemented by next call, it will be dissolved)
Document 2: Multi-Cloud KMS:
- Vani ( @Vani Murthy) to go through and address comments by Sam and EA on sections 2.2, 2.3, 2.3.4, 2.3.5
- Vani ( @Vani Murthy) to add context on Key Exchange in 2.3.4 as discussed on the call.
- Alex Rebo to provide feedback to questions Sam had addressed to him and Marina has tagged.
Assigned and Unassigned document's sections:
- 2.1 Feasibility assessment - author: Unassigned
- 2.2 Key Management Models - author: Vani ( @Vani Murthy)
- 2.3.1 Data Lakes - author: Chandra ( @Chandra Prakash)
- 2.3.2 Data Pipelines - author: Chandra ( @Chandra Prakash)
- 2.3.3 Streaming - author: Sunil ( @Sunil Arora)
- 2.3.4 TLS Transmission - author: Vani ( @Vani Murthy)
- 2.3.5 Signing/Verification - author: Vani ( @Vani Murthy)
- 2.3.6 Privacy / Usage / Propagate Directives author: Unassigned
- 2.3.7 E2EE / Application Encryption - author: Chandra ( @Chandra Prakash)
- 2.3.8 Key Sharing - author: Unassigned
- 2.3.9 Regulation / Governance / Forensic - author: Sam ( @Sam Pfanstiel)
- 2.4.1 Confidentiality - authors: Simon, Adeeb ( @Adeeb Mohammed)
- 2.4.2 Integrity - authors: Simon, Adeeb ( @Adeeb Mohammed)
- 2.4.3 Availability - authors: Simon, Adeeb ( @Adeeb Mohammed)
- 2.4.4 Portability - author: Unassigned
- 2.4.4 Separation of Duties - author: Simon, Adeeb ( @Adeeb Mohammed)
- 2.4.5 Usage Limitation - author: Simon, Adeeb ( @Adeeb Mohammed)
- 2.4.6 User/System Access - author: Simon
- 2.4.7 Rotation/Destruction - author: Simon
- 2.4.10 Third-party Risk - author: Sam ( @Sam Pfanstiel)
- 2.4.11 Regulatory Constraints - author: Sam ( @Sam Pfanstiel)
- 2.5.1 Organizational Maturity - author: Sam ( @Sam Pfanstiel)
- 2.5.2 Cost - author: Sam ( @Sam Pfanstiel)
- 2.5.3 Time - author: Sam ( @Sam Pfanstiel)
- 3.1 BYOK - author: Rajat ( @Rajat Dubey)
- 3.2 HYOK - author: Rajat ( @Rajat Dubey)
- 3.3 Directed Key Management - author: Sam ( @Sam Pfanstiel)
- 3.4 Hybrid Cloud - author: Sunil ( @Sunil Arora)
- 3.5 Third-party Multi-Cloud KMS (MCKMS) - author: Simon
To connect on the call:
URL: https://zoom.us/j/93617880747
Meeting ID: 936 1788 0747
Passcode: 536522
Kind regards,
Marina
------------------------------
Marina Bregkou,
Senior Research Analyst,
CSA
------------------------------