Trending...
- KLEKT Announces Appointment of Jay Kimpton to Board of Directors
- The Simplest Small Business You're Probably Not Thinking About
- Spokane: Flags Lowered for Peace Officers Memorial Day
SEATTLE--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
- Lick Introduces Pineapple Flavored Massage Oil — A Tropical Date Night Favorite Available on Amazon
- FutureLot Powers ADU Wizard for Massachusetts Clean Energy Center's Statewide ADU Resource Center
- ICT Innovations Releases ICTPBX Community Edition as Open Source Under Mozilla Public License 2.0
- Spokane: City Closures Planned for Memorial Day
- Spokane: Child Injured in Basement Fire Reminds About Youth Fire Setting
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
- Maryland Personal Injury Firm Earns National Recognition in 2026 ELA Awards
- Children's Author Releases Second Inspiring Career Book
- Robert J. Bradshaw's AYE is a Gripping Dual Reality Thriller Exploring the Increasingly Blurred Line Between Humanity and Technology
- Bangxing Silicone Revolutionizes Silicone Baby Product Partnerships: Low MOQ Support + VIP Long-Term Win-Win Programs
- SteelTree Announces Launch of Its Operational Decision Intelligence Service
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
0 Comments
Latest on Washingtoner
- Fyt-02 Launches on Kickstarter The Smart Sensor That Turns Any Chair Into a Posture & Movement Track
- YieldOMega Launches $DOUB Airdrop Campaign Ahead of TimeCurve Launch
- Kaltra Expands Microchannel Water Coil Line for U.S. HVAC Market With New Corrosion-Resistant Tube Technology
- Collectibles EvoRelic Celebrates Stellar 4.8-Star Customer Rating
- Phoenix Hip-hop Artist Rhymi Hits 23k Monthly Listeners 12 Days After Album Release
- Pediatrician Launches "Confessions of a Detective Doctor" Children's Book Series
- Integrated Maintenance Platforms Are Transforming Aircraft Operations
- T. Jones Group's Cameron Jones Serves as Judge for the 2026 CHBA National Awards for Housing Excellence
- Derek Advanced Tracking Systems Revolutionizes Asset Monitoring with Advanced Technology
- The AI Direction Deficit: TripleTen Study Finds Staff Get Told to Use AI — But Not Trained to Use It
- Spokane: Flags Lowered for Peace Officers Memorial Day
- $29.8 Million Record Setting Q1 with Boosted Annual Guidance to $160 Million for Expanding Pre-Owned Boat Dealer: Off The Hook YS, Inc. N Y S E: OTH
- All About Technology Celebrates 25 Years of Bridging Detroit's Digital Divide
- iatroX surpasses 500,000 clinical queries and expands specialist exam coverage
- Inside-Out Hollywood: The Relentless Rise of Joseph Nybyk (AKA Joseph Neibich)
- Lumetra Launches Engram, an MCP-Native Memory Layer Scoring 91.6% on LongMemEval
- Spokane Parks & Recreation's Therapeutic Recreation Receives Donation
- SRK Collective Media Group Launches with a Modern Approach to Media, Authority Building, and Cultural Visibility
- MSBG Corporation Acquires GridWatch US Telemetry Automation System
- TAYP Expands Athlete Exposure Platform Beyond Georgia With New Push Into Virginia and the 757