Trending...
- Spokane: 2025 Longitudinal Systems Analysis Shows Decreased Need for Homeless Services, Increase in Successful Exits to Stability
- Tacoma: Applications Now Being Accepted for Four Positions on the Planning Commission
- Impact Filtration Appoints Alejandro Sturniolo as Head of Sustainability to Engineer High-Performance, Water-Positive Infrastructure
SEATTLE--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
- Spokane: Gesa Pavilion Seeks Concert Booking, Production, and Ticketing Partner
- USA Best Book Awards Finalist What Love Leaves Behind Releases March 24
- Pallas Shake-speare: Independent Scholar Identifies Shakespeare's Lost Sonnet 126 Couplet
- Inkdnylon Custom Apparel Launches Cost-Saving System for Promotional Products and Custom Apparel in Chicago
- ENTOUCH Named Finalist for 2026 North American Inspiring Workplaces Awards
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
- Cleveland County Goat Farm NC Kikos Featured in "Feature Farmer Friday" Documentary
- Tony Grundler Introduces Artificial Intelligence V.S. Avatar-Ian's
- Spokane: US 195 Project To Improve Traffic Safety
- Hollywood's Elite Gather at the Annual WOW Creations Oscars Gifting Suite at the Universal Hilton
- Where Were the Women? Reframing the Greek Revolution Through Contemporary Art
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
0 Comments
Latest on Washingtoner
- Market Fell -3.01% last month on Iran Fears — Discover How AI Returned +5.64% for Retail Investors
- Ozz Metals Ltd Secures 1-Tonne Gold Offtake Agreement
- Jet Set: The Ultimate Coachella Afterparty
- Tacoma: Applications Now Being Accepted for Four Positions on the Planning Commission
- Heritage at Manalapan Introduces New Single-Family Home Community in One of Monmouth County's Most Desirable Locations
- Compliant Workspace announces partnership with Blackpoint Cyber
- Michigan Homeowners Urged to Act on Rising Basement Waterproofing Needs Amid Severe Flood
- Event Solutions Enters New Era: Announces New Leadership
- Carlsbad Hotel Named Best of La Quinta Award Winner
- Scoop Social Co. Launches a New Era of Mobile Hospitality — One Truck, Two Experiences
- Record Sales Growth After Strategic Acquisitions; New Distribution Agreements for Established Premium Cigar Supplier: Green Leaf Innovations $GRLF
- R2 Copilot Addresses Critical Privacy Issues as Enterprise AI Spending and Security Incidents Rise
- Innovative Environmental Technologies Unveils New Website Featuring Free AI Tools for the Environmental Industry
- CCHR Warns: Psychiatric Diagnoses Without Biological Proof Now Used to Justify Euthanasia
- Impact Filtration Appoints Alejandro Sturniolo as Head of Sustainability to Engineer High-Performance, Water-Positive Infrastructure
- Spokane: 2025 Longitudinal Systems Analysis Shows Decreased Need for Homeless Services, Increase in Successful Exits to Stability
- How Best Friends Turned Their Love of Boba Into a Wellness Brand
- 106 Years Strong: The Liberty Group Celebrates a Century-Plus of Service and Unveils a Unified Family of Companies
- Airport Transportation Reaches All Five Continents Through Global Transportation Partner Network
- Acquisition of Israeli Defense Manufacturing Platform to Accelerate AI-Driven Autonomous Systems: VisionWave Holdings, Inc.: (N A S D A Q: VWAV)