Download Publication

Key Management in Cloud Services
Release Date: 11/09/2020
Working Group: Cloud Key Management
- The conceptual architecture of a KMS, including 4 examples of cloud KMS patterns
- Encryption key management and control, including example controls for the different phases of the key management lifecycle
- Recommendations for utilizing the 2 most commonly used API architectures in the industry: REST (REpresentational State TRansfer) and SOAP (Simple Object Access Protocol)
- Practical considerations for API management
- Features of 5 major cloud service providers’ KMS offerings
Fill out this form to access this resource.
In my current job I work in:
Can we send you emails about other CSA projects?
By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).
Can we send you emails about other CSA projects?
By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).
Provide feedback on this form
Acknowledgements
Anup Marwaha
Sr Technical Director
Cyber security leader with hands-on experience in enhancing security posture for global Enterprises. Helping DevSecOps achieve enterprise grade key management, to reduce risk & deliver enhanced security solutions. Expertise in addressing needs in the field of digital trust & data protection.