Trending...
- ExtraCarry Now Supports Taurus GX2 13-Round Mags and 15-Round Magazines
- Oom Yung Doe Hosts Children's Halloween Safety Seminar in Kirkland
- New Free Science Bingo Cards Help Grade 1 Students Learn Through Play
SEATTLE--(BUSINESS WIRE)--The Cloud Security Alliance (CSA), the world's leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today released Cloud Key Management System with External Origin Key. Written by the Cloud Key Management Working Group to help organizations optimize such business outcomes as security, agility, cost, and compliance, the paper provides general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) in cases where organizations either want to or must import key material (e.g., keys, vaults, secrets, policies) from an external source.
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
"A cloud service provider's KMS often has strong ties to its other cloud services, and this same cloud-native KMS using EKO can be used with a customer's on-premises technologies and cloud services from other providers. Unsurprisingly, integrating a cloud KMS with an organization's assets spanning traditional private data centers, as well as private and public cloud services in various geographic locations presents a host of challenges," said Paul Rich, co-chair of the Cloud Key Management Working Group and one of the paper's authors. "It's our hope that after reading this document, program and project managers who have been tasked with leading their organization through the selection, planning, and deployment stages of cloud-native KMS using EKO will be able map considerations to their organization."
More on Washingtoner
- Cybersecurity is Fast Becoming a Vital Issue for Protecting Personal Information and Portfolio Wealth
- 10 Essential Tips for Maximizing Value When Choosing Your Orlando Wedding Venue
- Americans Are Trading Offices for Beaches: How Business Ownership Enables the Ultimate Location Freedom
- Boston Industrial Solutions' Natron® DC Series Ink Has Had an Upgrade!
- Colony Ridge Proudly Supports the All Ears! 2025 Sporting Clays Tournament
The guidance addresses the technical, operational, legal, regulatory, and financial aspects of leveraging a cloud-native KMS using external key origin (EKO) for each of the three stages of the lifecycle (choosing, planning, and deploying). Each aspect is broken down into further considerations and their accompanying justifications. Because cloud-native key management systems using EKO are relatively new, there isn't a large repository of best practices from which to draw. This guidance, therefore, combines best practices drawn from experience with traditional key management systems, cloud services in general, and cloud-native key management systems.
For further reading, Key Management in Cloud Services: Understanding Encryption's Desired Outcomes and Limitations provides the foundation for the choice of cloud KMS pattern and general guidance for using KMS whether the KMS is native to a cloud platform, external, self-operated, or yet another cloud service. Additionally, Recommendations for Adopting a Cloud-Native Key Management System provides more specific guidance for choosing, planning, and deploying cloud-native key management systems.
The Cloud Key Management Working Group aims to facilitate the standards for seamless integration between cloud service providers and key broker services. Those interested in participating in future research and initiatives involving cloud key management are invited to join the working group.
More on Washingtoner
- Jacob Emrani Nominated for LA Executive Award
- Spokane: Flags Lowered for Former Vice President Richard Cheney
- Kansas City Steak Company Shares the Return of Their Holiday Gift Box
- Dr. Jay A. Johannigman Delivers Lecture at the John R. Border Memorial Lectureship in Buffalo
- Powering the Next Frontier of the $1 Trillion Space Economy: Ascent Solar Technologies (N A S D A Q: ASTI)
Download Cloud Key Management System with External Origin Key now.
About Cloud Security Alliance
The Cloud Security Alliance (CSA) is the world's leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, training, certification, events, and products. CSA's activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers to governments, entrepreneurs, and the assurance industry — and provide a forum through which different parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Contacts
Media Contacts
Kristina Rundquist for the CSA
kristina@zagcommunications.com
Filed Under: Business
0 Comments
Latest on Washingtoner
- Tacoma: Planned System Outages in November 2025
- Pioneering the Future of Human-Computer Interaction Through AI-Powered Neural Input Technology: Wearable Devices Ltd. (N A S D A Q: WLDS)
- Epic Pictures Group Sets North American Release Date for the Action Thriller LOST HORIZON
- HR Soul Consulting Recognized as a 2025 Inc. Power Partner Award Winner for the Fourth Consecutive Year
- Eramls Investment Alliance under Nolan Mercer Launches InsightNova System for AI-Driven Investing
- Pullman Good Food Co-op Announces Future Home in the Heart of Downtown Pullman
- Atrish Investment Alliance Under Asher Mercer Expands Global Compliance Collaboration
- Spokane: Hope Soccer and Parks and Rec Partner to Expand Youth Soccer Access
- Tacoma: Portion of McMurray Hill Road NE to Close for Hazardous Tree Removal
- Tacoma: Connect With Creativity at 'Arts at the Armory' on November 15 and 16
- Spokane: City Details Veterans Day Schedule
- Brazil 021 Chicago Launches New Website and Expands with No-Gi Classes for All Levels
- American Star Guard Unveils a Powerful Rebrand and Expanded Security Services Throughout Nevada
- PlaceBased Media Expands Point-of-Care Advertising Inventory Across U.S. Clinic Network
- Flexible Plan Investments launches FlexDirex, a first-to-market suite of single-stock ETF strategies in the U.S
- Spokane: Mayor Brown Introduces Mid-Biennium Budget Modification To Close Deficit While Maintaining Community Priorities
- Spokane Police Chief's statement
- Spokane: Council Member Bingle to Host Press Conference
- Tacoma: Registration Now Open for OMWBE Active Certification Class on November 17
- Global Trade: The Pathway to Economic Prosperity