Download Publication
Who it's for:
- Program and project managers
- Business analysts
- Cloud architects
- Systems integrators
- Cloud customers and developers
- Security and compliance staff
Recommendations for Adopting a Cloud-Native Key Management Service
Release Date: 09/14/2021
Working Group: Cloud Key Management
- Detailed recommendations for selecting a cloud-native KMS
- Step-by-step guidance on planning and deploying cloud-based key management systems
- Technical considerations, including hardware security module backed keys and API functionality
- Strategies for integrating a cloud KMS with existing IT infrastructure
- Regulatory and legal implications of using cloud key management services
- Financial considerations and cost management strategies for cloud KMS deployments
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Mike Schrock
Senior Director Global Business Development – Cloud Strategy
Mike Schrock joined Thales Group (formally Gemalto) in 2015 as the Senior Director, Business Development, managing Cloud Service Provider Strategy. Mr. Schrock is passionate about and has championed digital transformation for over twenty years in his technology alliance and executive management experience, particularly in the digital, cloud and network security, internet and mobile sectors. Prior to joining Gemalto, he held executive roles ...
Michael Born
Director, Security Consulting
Michael has worked in and around Information Technology and Information Security for over ten (10) years with the majority of his experience in Application Security and Penetration Testing. Michael is the author of Binary Analysis Cookbook by Packt Publishing, enjoys participating in local Information Security groups such as The Omaha Chapter of OWASP, DC402, and often contributes CTF challenges to Kernelcon in Omaha, NE. When n...
Paul Rich
Executive Director, Data Management & Protection
Paul Rich is the executive director, data management and protection for JPMorgan Chase & Co., where he leads the strategy and implementation within the company for unstructured data protection both in the cloud and on-premises. He is the co-chair of the CSA Cloud Key Management Working Group, which he envisions as a means of hearing diverse perspectives on the use of cloud services and expectations for both data privacy and secu...
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Vani Murthy
Sr. Information Security Compliance Advisor, Akamai Technologies
Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture
Marina Bregkou
Senior Research Analyst, CSA EMEA
Damian Crosby
James Underwood
Senior Security Architect at Blackbaud, Inc
Abhishek Vyas
Head of Security Consultancy and Architecture
I have been working in Cybersecurity for over 10 years, and have been working on large scale multi-cloud programs in the Software and Finance industries over that period. I deliver business value through robust, scalable, fit for business cybersecurity, by establishing new ways of working to help the business to innovate. Challenging the status quo to help remove inertia, and ensuring that cybersecurity remains relevant and mea...
Jake Bernstein
Michael Church
Phil Cutforth
Interested in helping develop research with CSA?
Related Certificates & Training
CSA's Cloud Infrastructure Security training provides a high-level introduction to the most critical cloud security topics through virtual self-paced courses. Each Cloud Infrastructure Security training focuses on a specific area of cloud computing, and is design to be succinct, taking one-hour to complete.
Learn more