When buying a SaaS software having the requirement of BYOK to protect your data into the SaaS? How would you prefer to implement it?

Pass the keys to be applied periodically to the SaaS provider 21%

Have a third party tool to manage an intermediate keys model 72%

Let SaaS applications call your Key Vault or HSM 4%

No need if SaaS provider use CSP key managed services (let hyperscaler do and manage keys)3%

68 PARTICIPANTS
725 viewscircle icon1 Comment
Sort by:
CISO2 years ago

You mitigate risk by having a third-party. If you get attacked, they are not. If they get attacked. You isolate them and create a new key.

Content you might like

Yes, we have many27%

Yes, we have a few62%

We have some but don’t really enforce them8%

We don’t have policies in place to protect documents1%

View Results

Compliance requirements25%

Operational objectives65%

Ease of implementation8%

Cost

View Results