Cloud Key Management

Kind reminder of tomorrow's working group call!

  • 1.  Kind reminder of tomorrow's working group call!

    Posted Jun 11, 2024 02:57:00 PM

    Dear members,

    This is a reminder of tomorrow's Key Mgmt working group call scheduled to take place (Wednesday, June 12th) at 09:00 a.m. PT / 12:00 p.m. ET / 16:00 GMT.

    Agenda:

    Document 1 - Best Practices when Migrating:

    • Sunil @Sunil Arora to connect with Yuvaraj and identify the updated sections of 2 and 3 and 4.4 OR make the review and verification of this action independently if possible.
    • Sections 1 and 2 update by Partha.
    • Michael ( @Michael Roza) to Concise section 4.1 and 4.2 on key points. Too many examples: perhaps using less is possible.
    • Phani ( @@Phanikumar Kancharla) to review and provide feedback/comments at the paper's content. (If this action item is not implemented by next call, it will be dissolved)

    Document 2: Multi-Cloud KMS:

    • Vani ( @Vani Murthy) to go through and address comments by Sam and EA on sections 2.2, 2.3, 2.3.4, 2.3.5
    • Vani ( @Vani Murthy) to add context on Key Exchange in 2.3.4 as discussed on the call.
    • Alex Rebo to provide feedback to questions Sam had addressed to him and Marina has tagged.

    Assigned and Unassigned document's sections:

    • 2.1 Feasibility assessment - author: Unassigned
    • 2.2 Key Management Models - author: Vani ( @Vani Murthy)
    • 2.3.1 Data Lakes - author: Chandra ( @Chandra Prakash)
    • 2.3.2 Data Pipelines - author: Chandra ( @Chandra Prakash)
    • 2.3.3 Streaming - author: Sunil ( @Sunil Arora)
    • 2.3.4 TLS Transmission - author: Vani ( @Vani Murthy)
    • 2.3.5 Signing/Verification - author: Vani ( @Vani Murthy)
    • 2.3.6 Privacy / Usage / Propagate Directives author: Unassigned
    • 2.3.7 E2EE / Application Encryption - author: Chandra ( @Chandra Prakash)
    • 2.3.8 Key Sharing - author:  Unassigned
    • 2.3.9 Regulation / Governance / Forensic - author: Sam ( @Sam Pfanstiel)
    • 2.4.1 Confidentiality - authors: Simon, Adeeb ( @Adeeb Mohammed)
    • 2.4.2 Integrity - authors: Simon, Adeeb ( @Adeeb Mohammed)
    • 2.4.3 Availability - authors: Simon, Adeeb ( @Adeeb Mohammed)
    • 2.4.4 Portability - author: Unassigned
    • 2.4.4 Separation of Duties - author: Simon, Adeeb ( @Adeeb Mohammed)
    • 2.4.5 Usage Limitation - author: Simon, Adeeb ( @Adeeb Mohammed)
    • 2.4.6 User/System Access - author: Simon
    • 2.4.7 Rotation/Destruction - author: Simon
    • 2.4.10 Third-party Risk - author: Sam ( @Sam Pfanstiel)
    • 2.4.11 Regulatory Constraints - author: Sam ( @Sam Pfanstiel)
    • 2.5.1 Organizational Maturity  - author: Sam ( @Sam Pfanstiel)
    • 2.5.2 Cost - author: Sam ( @Sam Pfanstiel)
    • 2.5.3 Time - author: Sam ( @Sam Pfanstiel)
    • 3.1 BYOK - author: Rajat ( @Rajat Dubey)
    • 3.2 HYOK - author: Rajat ( @Rajat Dubey)
    • 3.3 Directed Key Management - author: Sam ( @Sam Pfanstiel)
    • 3.4 Hybrid Cloud - author: Sunil ( @Sunil Arora)
    • 3.5 Third-party Multi-Cloud KMS (MCKMS) -  author: Simon

    To connect on the call:

    URL: https://zoom.us/j/93617880747
    Meeting ID: 936 1788 0747
    Passcode: 536522

    Kind regards,
    Marina



    ------------------------------
    Marina Bregkou,
    Senior Research Analyst,
    CSA
    ------------------------------