ChaptersEventsBlog
Register now for the December 10 session on redefining cloud security in the era of AI and automation.

Download Publication

Key Management in Cloud Services
Key Management in Cloud Services
Who it's for:
  • CISOs and security leaders
  • Cloud and security architects
  • IT and security administrators
  • Compliance, audit, and risk management teams
  • DevOps and platform engineering teams
  • Cloud service providers and solution engineers

Key Management in Cloud Services

Release Date: 11/09/2020

Updated On: 12/09/2025

This publication provides updated, comprehensive guidance on how organizations should design, evaluate, and operate Key Management Systems (KMS) in modern cloud environments. 

Building on NISTIR 7956 and other foundational standards, this document explains how traditional key management practices must adapt. Modern practices must account for shared infrastructure, multi-tenancy, and cloud provider trust boundaries. It also highlights how you should drive encryption through clearly defined business needs, rather than assume it as a default.

This publication also explores the four major cloud KMS architecture patterns. These include Cloud-Native, External Key Origination, External KMS, and Multi-Cloud KMS. It also provides practical, cloud-specific guidance for establishing a strong cryptographic key lifecycle, from generation and activation through rotation, archival, recovery, and destruction.

Additionally, this publication explores key management operations, governance controls, and policy requirements. It concludes with forward-looking insights into post-quantum cryptography and the emerging need for crypto-agility.

Key Takeaways:
  • How the four dominant cloud KMS architectural patterns compare
  • How to build a complete cryptographic key lifecycle aligned with cloud environments
  • The governance, policy, and risk considerations unique to cloud encryption
  • API and integration models for secure, scalable key management
  • How to prepare for post-quantum transitions and future cryptographic requirements
Download this Resource

Bookmark
Share
Related resources
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
Key Management for Public Cloud Migration
Key Management for Public Cloud Migration
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Prepare for Q-Day with Hybrid Mode Key Exchange
Prepare for Q-Day with Hybrid Mode Key Exchange
Published: 11/17/2025
NISTIR 8547: From PQC Standards to Real-World Implementations
NISTIR 8547: From PQC Standards to Real-World Implementations
Published: 03/20/2025
Assessing the Security of FHE Solutions
Assessing the Security of FHE Solutions
Published: 03/19/2025
Implementing CCM: Cryptography, Encryption, and Key Management
Implementing CCM: Cryptography, Encryption, and Key Management
Published: 03/10/2025

Interested in helping develop research with CSA?

Related Certificates & Training