Published: 19 December 2017
Summary
Incompatible encryption and key management services being offered by infrastructure as a service and platform as a service providers are complicating the building of cohesive data protection. When adopting cloud services, security and risk management leaders need to base multiple strategies on risk.
Included in Full Research
- Identify and Prioritize Critical Datasets
- Determine the Security Levels Needed for Each Dataset, and Implement Encryption
- Match Security Policy Orchestration Needs With Available KMaaS Technology
- Software-Based Key Management Services
- Cloud HSM
- BYOK
- HYOK
- MPC
- Intel SGX and AMD SEV
- Enforce Consistent Life Cycle Management Policies Across Clouds
- Ensure All Cryptographic Operations Are Logged and Audited and Potential Security Events Are Alerted