Trending...
- Tacoma: Lincoln Avenue Bridge to Close Saturday, April 18 for Asphalt Repairs
- Mensa Brings National Board Game Competition to Northern Virginia April 16-19
- Cinder Labs Launches AIRA Shield: Purpose-Built AI Security Platform to Combat Shadow AI
SEATTLE--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
- Charging Into the $30 Billion Heart Failure Market with Late-Stage Momentum, Breakthrough Data, & Strong Financial Backing: Cardiol Therapeutics $CRDL
- All American Home Renovators: Transforming Bathrooms into Masterpieces, One Home at a Time
- Bold Beauty Project Celebrates Anniversary with Collaborative Exhibition at FIU's Miami Beach Urban Studios
- Pacific Emblem Company Launches "Happy 250th Birthday America" Collection and Proud Supporter of the Gary Sinise Foundation
- Vangal Invests $8.5M in Peridot, Expanding into Enterprise AI Governance and Shadow AI Control
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
- Bold Beauty Project Announces Exhibition at Palazzo Mora Venice, Italy
- Financial Educator Jessica Perrone Launches Free "3 Stages of Building Wealth" Course for Women
- Captain Notepad Expands Free Custom Design Services Across Full Product Line
- Sycor Introduces Spring Release 2026 of Sycor.Rental with AI-Driven Innovations and Enhanced Service Processes
- YOKE Expands NIL Club Into Athlete-Led Commerce With Athlete Merch Launch
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
0 Comments
Latest on Washingtoner
- Haven Treatment Center to Attend Shared Hope International Training Event in Vancouver
- L2 Aviation Appoints Tony Bailey as President and Chief Operating Officer
- Spokane: City Council Hosts Community Day Celebrating Disability And Accessibility Community
- Pieter Bouterse Studio Founder to Retire After 40+ Years; Seeks Successor to Continue Legacy
- #WeAreGreekWarriors Opening Reception Packs the House
- Tacoma Police Department's CALEA Public Comment Portal
- Mensa Brings National Board Game Competition to Northern Virginia April 16-19
- Special Alert! Highly Undervalued Stock: $317M Revenue in 2025 for Telecom Leader IQSTEL, Inc. (N A S D A Q: IQST)
- Igniting High-Growth Transformation With Launch of XMax AI Subsidiary, Leveraging Global Furniture Dominance to Enter Explosive AI Markets: XMax Inc
- Acuvance Earns 2026 Great Place to Work® Certification
- As Global Tensions Rise, Demand Grows for Private Spaces to Process Thoughts and Speak Freely Online
- Two Porch Fires Displace Eleven Residents in Spokane
- Cryptsoft demonstrates Hybrid-PQC Authentication Token use for quantum-safe systems and infrastructure
- Expert Law Attorneys' Top Law Firms to Know: March 2026
- Cinder Labs Launches AIRA Shield: Purpose-Built AI Security Platform to Combat Shadow AI
- City of Tacoma to Host In-Person 'P&L Show & Tell' Financial Workshop for Small Businesses on April 21
- City of Tacoma Implements Strategic Freeze on Hiring and Promotions
- Spokane Police Officers Rescue Puppy After Thief Abandoned It
- Green Office Partner Strengthens Global Operations with Mexico-Based DigitalVAAR Partnership
- P-Wave Classics Announces the Publication of The Female Quixote, Volume I, by Charlotte Lennox