Trending...
- South Spokane Resident Arrives Home To Find Male Burglarizing Apartment; Resident Assaulted Before Suspect Flees The Area
- Spokane City Council Votes on Department of Justice Grant
- Tacoma: Community Event Funding Announced for 2026
SEATTLE--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
- Cyntexa Outlines a Principles-first Approach to Modern Enterprise Transformation
- Kickstarter And Creator Camp Partner To Support A New Era Of Creator-led Independent Film
- Top 66 People-Centric Leaders of 2025 Prove Taking Care of People Is Taking Care of Business
- Kliemann Brothers Announces 2025 Furnace Giveaway Winners
- Spokane: Coffee With Council District 2 Council Members
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
- RNHA Celebrates One Year In, President Trump — the American Comeback Is Underway
- Daniel Kaufman Launches a Vertically Integrated Real Estate and Investment Platform
- Long Long Tales: Bilingual Cartoon Series on Youtube Celebrating Chinese New Year
- MAX Illumination Redefines Cabinet Displays with New Edge-Lit LED Technology
- Impact Futures Group expands through acquisition of specialist healthcare sector training provider Caring for Care
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
0 Comments
Latest on Washingtoner
- Appliance Outlet Caps Off a Record-Setting 2025 Nationwide, Gears Up for Even Greater Growth in 2026
- Home Prices Just Hit 5X Median Income — So Americans Are Buying Businesses Instead of Houses
- New USCIS Interpreter Requirements Create Demand for Qualified Immigration Interpreters — Local Expert Explains What Applicants Need to Know
- CCHR White Paper Urges Government Crackdown on Troubled Teen and For-Profit Psychiatric Facilities
- Still Searching for the Perfect Valentine's Gift? Lick Personal Oils Offers Romantic, Experience-Driven Alternatives to Traditional Presents
- Boston Industrial Solutions' BPA Certified BX Series Raises the Bar for Pad Printing Inks
- Tacoma: Community Event Funding Announced for 2026
- Boston Corporate Coach™ Sets Global Standard for Executive Chauffeur Services Across 680 Cities
- UK Financial Ltd Announces CoinMarketCap Supply Verification And Market Positioning Review For Regulated Security Tokens SMPRA And SMCAT
- Sharpe Automotive Redefines Local Car Care with "Transparency-First" Service Model in Santee
- South Spokane Resident Arrives Home To Find Male Burglarizing Apartment; Resident Assaulted Before Suspect Flees The Area
- Spokane City Council Votes on Department of Justice Grant
- Spokane: Firefighters Contain Fire After Car Crashes Into Home
- City of Tacoma Observes Dr. Martin Luther King Jr.'s Birthday on January 19
- Tacoma: OMWBE Intro to Certification 101 Workshop on February 4
- Secondesk Launches Powerful AI Tutor That Speaks 20+ Languages
- Automation, innovation in healthcare processes featured at international conference in Atlanta
- A High-Velocity Growth Story Emerges in Marine and Luxury Markets
- $26 Billion Global Market by 2035 for Digital Assets Opens Major Potential for Currency Tech Company with ATM Expansion and Deployment Plans Underway
- Secure AI Acceleration Launches to Make AI Safe to Deploy for Profit