Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

Recommendations for Adopting a Cloud-Native Key Management Service
Recommendations for Adopting a Cloud-Native Key Management Service
Who it's for:
  • Program and project managers
  • Business analysts
  • Cloud architects
  • Systems integrators
  • Cloud customers and developers
  • Security and compliance staff

Recommendations for Adopting a Cloud-Native Key Management Service

Release Date: 09/14/2021

Working Group: Cloud Key Management

Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, particularly for cloud services within the same provider. This document provides comprehensive guidance on choosing, planning, and deploying a cloud-native KMS. It focuses on how to optimize business outcomes such as agility, cost efficiency, and compliance. It also addresses the breadth of technical, legal, regulatory, and financial considerations vital for successful cloud KMS integration.

IT and business professionals will find this to be essential reading when implementing their cloud-based key management services. Professionals will learn how to leverage these services to enhance their security posture while maintaining compliance with industry standards.

Key Takeaways:
  • Detailed recommendations for selecting a cloud-native KMS
  • Step-by-step guidance on planning and deploying cloud-based key management systems
  • Technical considerations, including hardware security module backed keys and API functionality
  • Strategies for integrating a cloud KMS with existing IT infrastructure
  • Regulatory and legal implications of using cloud key management services
  • Financial considerations and cost management strategies for cloud KMS deployments
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
AI in Medical Research: Applications & Considerations
AI in Medical Research: Applications & Consider...
Don’t Panic! Getting Real about AI Governance
Don’t Panic! Getting Real about AI Governance
Using AI for Offensive Security
Using AI for Offensive Security
Leveraging Zero-Knowledge Proofs in Machine Learning and LLMs: Enhancing Privacy and Security
Leveraging Zero-Knowledge Proofs in Machine Learning and LLMs: Enha...
Published: 09/20/2024
Current Challenges with Managing Permissions and API Keys
Current Challenges with Managing Permissions and API Keys
Published: 09/18/2024
The Edge Revolution: Transforming Experiences in a Hyperconnected World
The Edge Revolution: Transforming Experiences in a Hyperconnected W...
Published: 09/17/2024
What are OAuth Tokens, and Why are They Important to Secure?
What are OAuth Tokens, and Why are They Important to Secure?
Published: 09/12/2024
Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?
Know Your Exposure: Is Your Cloud Data Secure in the Age of AI?
November 6 | Online

Acknowledgements

Mike Schrock
Mike Schrock
Senior Director Global Business Development – Cloud Strategy

Mike Schrock

Senior Director Global Business Development – Cloud Strategy

Mike Schrock joined Thales Group (formally Gemalto) in 2015 as the Senior Director, Business Development, managing Cloud Service Provider Strategy. Mr. Schrock is passionate about and has championed digital transformation for over twenty years in his technology alliance and executive management experience, particularly in the digital, cloud and network security, internet and mobile sectors. Prior to joining Gemalto, he held executive roles ...

Read more

Michael Born
Michael Born
Director, Security Consulting

Michael Born

Director, Security Consulting

Michael has worked in and around Information Technology and Information Security for over ten (10) years with the majority of his experience in Application Security and Penetration Testing. Michael is the author of Binary Analysis Cookbook by Packt Publishing, enjoys participating in local Information Security groups such as The Omaha Chapter of OWASP, DC402, and often contributes CTF challenges to Kernelcon in Omaha, NE. When n...

Read more

Paul Rich
Paul Rich
Executive Director, Data Management & Protection

Paul Rich

Executive Director, Data Management & Protection

Paul Rich is the executive director, data management and protection for JPMorgan Chase & Co., where he leads the strategy and implementation within the company for unstructured data protection both in the cloud and on-premises. He is the co-chair of the CSA Cloud Key Management Working Group, which he envisions as a means of hearing diverse perspectives on the use of cloud services and expectations for both data privacy and secu...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Vani Murthy
Vani Murthy
Sr. Information Security Compliance Advisor, Akamai Technologies

Vani Murthy

Sr. Information Security Compliance Advisor, Akamai Technologies

Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture

Read more

Marina Bregkou
Marina Bregkou
Senior Research Analyst, CSA EMEA

Marina Bregkou

Senior Research Analyst, CSA EMEA

Damian Crosby Headshot Missing
Damian Crosby

Damian Crosby

James Underwood
James Underwood
Senior Security Architect at Blackbaud, Inc

James Underwood

Senior Security Architect at Blackbaud, Inc

Abhishek Vyas
Abhishek Vyas
Head of Security Consultancy and Architecture

Abhishek Vyas

Head of Security Consultancy and Architecture

I have been working in Cybersecurity for over 10 years, and have been working on large scale multi-cloud programs in the Software and Finance industries over that period. I deliver business value through robust, scalable, fit for business cybersecurity, by establishing new ways of working to help the business to innovate. Challenging the status quo to help remove inertia, and ensuring that cybersecurity remains relevant and mea...

Read more

Jake Bernstein Headshot Missing
Jake Bernstein

Jake Bernstein

Michael Church Headshot Missing
Michael Church

Michael Church

Phil Cutforth Headshot Missing
Phil Cutforth

Phil Cutforth

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training