Download Publication

Who it's for:
- Security Architects
- IT Analyst
- Developers
- System Integrators
- Compliance Managers
- Cybersecurity Professionals
- Program and Project Managers
- Cloud Customers
Recommendations for Adopting a Cloud-Native Key Management Service
Release Date: 09/14/2021
Working Group: Cloud Key Management
- Learn how to create a list of requirements that the provider can meet.
- When planning for deployment, learn how to create a list of requirements that will be used by the user deploying the cloud-native KMS.
- Understand how to perform the processes required to set up the KMS and start utilizing its services.
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Paul Rich
Executive Director, Data Management & Protection
Paul Rich is the executive director, data management and protection for JPMorgan Chase & Co., where he leads the strategy and implementation within the company for unstructured data protection both in the cloud and on-premises. He is the co-chair of the CSA Cloud Key Management Working Group, which he envisions as a means of hearing diverse perspectives on the use of cloud services and expectations for both data privacy and secu...

Michael Roza
Risk, Audit, Control, and Compliance Professional
Since 2012 Michael has contributed to over 85 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud Ke...

Mike Schrock
Senior Director Global Business Development – Cloud Strategy
Mike Schrock joined Thales Group (formally Gemalto) in 2015 as the Senior Director, Business Development, managing Cloud Service Provider Strategy. Mr. Schrock is passionate about and has championed digital transformation for over twenty years in his technology alliance and executive management experience, particularly in the digital, cloud and network security, internet and mobile sectors. Prior to joining Gemalto, he held executive roles ...

Michael Born
Director, Security Consulting
Michael has worked in and around Information Technology and Information Security for over ten (10) years with the majority of his experience in Application Security and Penetration Testing. Michael is the author of Binary Analysis Cookbook by Packt Publishing, enjoys participating in local Information Security groups such as The Omaha Chapter of OWASP, DC402, and often contributes CTF challenges to Kernelcon in Omaha, NE. When n...

Vani Murthy
Sr. Information Security Compliance Advisor, Akamai Technologies
Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture
Marina Bregkou
Senior Research Analyst, CSA EMEA
This person does not have a biography listed with CSA.

Damian Crosby
This person does not have a biography listed with CSA.

James Underwood
Senior Security Architect at Blackbaud, Inc
This person does not have a biography listed with CSA.

Abhishek Vyas
Head of Security Consultancy and Architecture
I have been working in Cybersecurity for over 10 years, and have been working on large scale multi-cloud programs in the Software and Finance industries over that period. I deliver business value through robust, scalable, fit for business cybersecurity, by establishing new ways of working to help the business to innovate. Challenging the status quo to help remove inertia, and ensuring that cybersecurity remains relevant and mea...

Jake Bernstein
This person does not have a biography listed with CSA.

Michael Church
This person does not have a biography listed with CSA.

Phil Cutforth
This person does not have a biography listed with CSA.