<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cybersecurity Cloud Lesson 1 rule book in key management in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61148#M337</link>
    <description>&lt;P&gt;So, really just one rule, "&lt;STRONG&gt;Your encryption keys are the keys to your castle. So protect them with your life!&lt;/STRONG&gt;".&amp;nbsp; All the others are just corollaries that describe various ways in which one may fail to protect them.&amp;nbsp;&amp;nbsp;Great list, though!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing to consider is that more keys, each with a smaller footprint reduces the blast-radius if something is compromised.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jul 2023 03:14:41 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2023-07-25T03:14:41Z</dc:date>
    <item>
      <title>Cybersecurity Cloud Lesson 1 rule book in key management</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61105#M336</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Courtesy of Professor Bill Buchanan OBE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Cybersecurity Cloud Lesson 1 rule book in key management for companies:&lt;/P&gt;&lt;OL class=""&gt;&lt;LI&gt;Your encryption keys are the keys to your castle. So protect them with your life!&lt;/LI&gt;&lt;LI&gt;Your enemy is you! The main threat is insiders, so beware of yourself and others in your company.&lt;/LI&gt;&lt;LI&gt;Beware of those that you trust and who you partner with. They can be your enemies, too.&lt;/LI&gt;&lt;LI&gt;For sensitive data, try not to let Amazon or Microsoft manage your keys.&lt;/LI&gt;&lt;LI&gt;Put your private keys in an HSM (Hardware Security Module). A shared HSM is fine, but if you have funds, create your own Cloud HSM.&lt;/LI&gt;&lt;LI&gt;If you are audited for your keys, you may need an on-premise HSM to link to your Cloud instance.&lt;/LI&gt;&lt;LI&gt;Create meaningful tags for your keys that make sense for everyone. Don’t tag them as “Key1”, “Key2”, and so on. Give them meaning, “Main Active Directory Single Sign-on Key for Sales in Europe”. Add words that allow you to search for keys easily.&lt;/LI&gt;&lt;LI&gt;Log the usage of your keys everywhere and link to people, roles, services and applications. Log, log and log some more.&lt;/LI&gt;&lt;LI&gt;Watch out for those keys being deleted … it is one of the easiest hacks for a disgruntled employee to perform.&lt;/LI&gt;&lt;LI&gt;Watch out for key wrapping from your insiders and your key exports. See Point 1.&lt;/LI&gt;&lt;LI&gt;Use a tiered alerting system which escalates the severity of the key usage, but make sure you keep those logs.&lt;/LI&gt;&lt;LI&gt;Use envelope encryption.&lt;/LI&gt;&lt;LI&gt;Test, test, and test some more.&lt;/LI&gt;&lt;LI&gt;Audit, audit, and audit. On a daily basis, if necessary.&lt;/LI&gt;&lt;LI&gt;Test those encrypted backups.&lt;/LI&gt;&lt;LI&gt;We all make mistakes. If you delete a key, please say, as we have 60 days to undelete it.&lt;/LI&gt;&lt;LI&gt;Use key rotation wherever possible.&lt;/LI&gt;&lt;LI&gt;Just because ECDSA and EdDSA sound all fancy and brand new doesn’t mean that RSA is not an option.&lt;/LI&gt;&lt;LI&gt;RSA is still your friend. Forget about those doom sayers on quantum cracking.&lt;/LI&gt;&lt;LI&gt;MD5 and SHA-1 should never, ever, be seen.&lt;/LI&gt;&lt;LI&gt;Beware of DevOpSec. They can be sloppy with their keys. Tell them off for doing risky things!&lt;/LI&gt;&lt;/OL&gt;&lt;P class=""&gt;I had better stop here. So, finally, put a large poster on the wall that says, “no key, means no data!”, “the enemy is within and around you!”, “A breach of the trust infrastructure is one of the most expensive cybersecurity threats to resolve”, “A single key breached, and this company could be finished!”.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="" data-unlink="true"&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Details here: https://lnkd.in/eQWeaq5X&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Sounds a lot like Microsoft...&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:39:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61105#M336</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Cloud Lesson 1 rule book in key management</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61148#M337</link>
      <description>&lt;P&gt;So, really just one rule, "&lt;STRONG&gt;Your encryption keys are the keys to your castle. So protect them with your life!&lt;/STRONG&gt;".&amp;nbsp; All the others are just corollaries that describe various ways in which one may fail to protect them.&amp;nbsp;&amp;nbsp;Great list, though!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing to consider is that more keys, each with a smaller footprint reduces the blast-radius if something is compromised.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 03:14:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61148#M337</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2023-07-25T03:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Cloud Lesson 1 rule book in key management</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61169#M338</link>
      <description>&lt;P&gt;While all the points looks good in theory, what makes you think customer can handle and protect the keys to the castle much better than the CSPs? In fact, in practice, many organizations dealing with sensitive information in cloud including the ones that are highly regulated, take the CMK or CSP managed key approach as opposed to CSK.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jul 2023 19:15:32 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cybersecurity-Cloud-Lesson-1-rule-book-in-key-management/m-p/61169#M338</guid>
      <dc:creator>sb23</dc:creator>
      <dc:date>2023-07-25T19:15:32Z</dc:date>
    </item>
  </channel>
</rss>

