ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Key Responsibility Models
Key Responsibility Models
Who it's for:
  • Cloud Security Architects
  • CISOs and Security Leaders
  • Compliance & Risk Management Professionals
  • Cloud Infrastructure & Operations Teams
  • Cryptography and Key Management Engineers

Key Responsibility Models

Release Date: 12/10/2025

This infographic offers a clear understanding of how cloud service providers and customers share responsibilities for cloud key management.

Cloud key management approaches include Bring Your Own Key (BYOK), Hold Your Own Key (HYOK), Provider-Managed Key (PMK), and Customer-Managed Key (CMK). As vendors increasingly use these terms inconsistently, organizations struggle to determine who is responsible for key generation, storage, usage, access, rotation, and auditing. This infographic resolves that confusion by mapping these activities across the major key responsibility models. The goal is to help stakeholders select the right approach for their security, compliance, and operational needs.

The first page provides high-level architectural definitions of CMKs, BYOK, HYOK, and PMKs, along with emerging hybrid patterns. The second page features a matrix that compares responsibilities across each stage of the key lifecycle. This practical reference chart helps teams designing cryptographic controls, meeting regulatory requirements, or planning for evolving technologies such as post-quantum cryptography.

Key Takeaways:
  • Clear definitions of PMK, CMK, BYOK, HYOK, and hybrid key responsibility models
  • Provider vs. customer responsibilities across the key lifecycle
  • How to align security controls with standards and regulatory requirements (e.g., FIPS 140-3, NIST SP 800-57, HIPAA, PCI DSS)
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
Key Management for Public Cloud Migration
Key Management for Public Cloud Migration
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Is Cloud-Native Key Management Right for You?
Is Cloud-Native Key Management Right for You?
Published: 12/19/2025
Prepare for Q-Day with Hybrid Mode Key Exchange
Prepare for Q-Day with Hybrid Mode Key Exchange
Published: 11/17/2025
NISTIR 8547: From PQC Standards to Real-World Implementations
NISTIR 8547: From PQC Standards to Real-World Implementations
Published: 03/20/2025
Assessing the Security of FHE Solutions
Assessing the Security of FHE Solutions
Published: 03/19/2025

Interested in helping develop research with CSA?

Related Certificates & Training