Purchase this Document
Price: $195.00 USD (PAGES: 11)
To purchase this document, you will need to register or sign in above.
Incompatible encryption and key management services being offered by infrastructure as a service and platform as a service providers are complicating the building of cohesive data protection. When adopting cloud services, security and risk management leaders need to base multiple strategies on risk.
Table of Contents
Identify and Prioritize Critical Datasets
Determine the Security Levels Needed for Each Dataset, and Implement Encryption
Match Security Policy Orchestration Needs With Available KMaaS Technology
- Software-Based Key Management Services
- Cloud HSM
- Intel SGX and AMD SEV
Enforce Consistent Life Cycle Management Policies Across Clouds
Ensure All Cryptographic Operations Are Logged and Audited and Potential Security Events Are Alerted
- Identify and Prioritize Critical Datasets
Gartner Recommended Reading