ChaptersEventsBlog
Join Cohesity Catalyst on Tour at the data security and AI summit in NYC, Paris, or Singapore →

Key Responsibility Models

Released: 12/10/2025

Key Responsibility Models
Key Responsibility Models
This infographic offers a clear understanding of how cloud service providers and customers share responsibilities for cloud key management.

Cloud key management approaches include Bring Your Own Key (BYOK), Hold Your Own Key (HYOK), Provider-Managed Key (PMK), and Customer-Managed Key (CMK). As vendors increasingly use these terms inconsistently, organizations struggle to determine who is responsible for key generation, storage, usage, access, rotation, and auditing. This infographic resolves that confusion by mapping these activities across the major key responsibility models. The goal is to help stakeholders select the right approach for their security, compliance, and operational needs.

The first page provides high-level architectural definitions of CMKs, BYOK, HYOK, and PMKs, along with emerging hybrid patterns. The second page features a matrix that compares responsibilities across each stage of the key lifecycle. This practical reference chart helps teams designing cryptographic controls, meeting regulatory requirements, or planning for evolving technologies such as post-quantum cryptography.

Key Takeaways:
  • Clear definitions of PMK, CMK, BYOK, HYOK, and hybrid key responsibility models
  • Provider vs. customer responsibilities across the key lifecycle
  • How to align security controls with standards and regulatory requirements (e.g., FIPS 140-3, NIST SP 800-57, HIPAA, PCI DSS)

Download this Resource

Prefer to access this resource without an account? Download it now.


Best For IconBest For:
  • Cloud Security Architects
  • CISOs and Security Leaders
  • Compliance & Risk Management Professionals
  • Cloud Infrastructure & Operations Teams
  • Cryptography and Key Management Engineers

Partner Event Spotlight

Want to see your content featured here?

Contact us to learn more!

Explore More of CSA

Research & Best Practices

Stay informed about the latest best practices, reports, and solutions in cloud security with CSA research.

Upcoming Events & Conferences

Stay connected with the cloud security community by attending local events, workshops, and global CSA conferences. Engage with industry leaders, gain new insights, and build valuable professional relationships—both virtually and in person.

Training & Certificates

Join the countless professionals who have selected CSA for their training and certification needs.

Industry News

Stay informed with the latest in cloud security news - visit our blog to keep your competitive edge sharp.