The latest document in open peer review from the Cloud Key Management Working Group provides guidance on how to assess and implement cloud key management services concerning an organization’s needs for key management. It is the responsibility of the customer to then use encryption keys (or other artifacts, such as secrets) in ways that follow encryption best practices.
Assembled by our Cloud Key Management Working Group, this document is accepting peer reviewers through August 12. Participate here → Recommendations for using a Customer Controlled Key Store | CSA
#cloudkeymanagement #encryption #informationtechnology
CSA |
remove preview |
|
Recommendations for using a Customer Controlled Key Store | CSA |
In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services concerning an organization's needs for key management - it is the responsibility of the customer to then use encryption keys (or other artifacts, such as secrets) in ways that follow encryption best practices. |
View this on CSA > |
|
|
------------------------------
Orbert Reavis
Circle Guide
CSA
------------------------------