Cloud 101
Circle
Events
Blog

Download Publication

Recommendations for using a Customer Controlled Key Store
Recommendations for using a Customer Controlled Key Store

Recommendations for using a Customer Controlled Key Store

Release Date: 09/26/2022

Working Group: Cloud Key Management

In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services concerning an organization’s needs for key management - it is the responsibility of the customer to then use encryption keys (or other artifacts, such as secrets) in ways that follow encryption best practices. Coverage includes mainstream business and Information technology (IT) usage of hybrid and cloud technologies. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Acknowledgements

Paul Rich
Paul Rich
Executive Director, Data Management & Protection

Paul Rich

Executive Director, Data Management & Protection

Paul Rich is the executive director, data management and protection for JPMorgan Chase & Co., where he leads the strategy and implementation within the company for unstructured data protection both in the cloud and on-premises. He is the co-chair of the CSA Cloud Key Management Working Group, which he envisions as a means of hearing diverse perspectives on the use of cloud services and expectations for both data privacy and secu...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 85 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud Key M...

Read more

Michael Born
Michael Born
Director, Security Consulting

Michael Born

Director, Security Consulting

Michael has worked in and around Information Technology and Information Security for over ten (10) years with the majority of his experience in Application Security and Penetration Testing. Michael is the author of Binary Analysis Cookbook by Packt Publishing, enjoys participating in local Information Security groups such as The Omaha Chapter of OWASP, DC402, and often contributes CTF challenges to Kernelcon in Omaha, NE. When n...

Read more

Iain Beveridge
Iain Beveridge
Senior Product Marketing Manager

Iain Beveridge

Senior Product Marketing Manager

This person does not have a biography listed with CSA.

Vani Murthy
Vani Murthy
Senior advisor Security & Compliance at Akamai Technologies

Vani Murthy

Senior advisor Security & Compliance at Akamai Technologies

Vani has 20+ years of IT experience in the areas such as Security, Risk, Compliance, Cloud services (IaaS/PaaS/SaaS) architecture

Read more

Marina Bregkou
Marina Bregkou
Senior Research Analyst, CSA EMEA

Marina Bregkou

Senior Research Analyst, CSA EMEA

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?