Hi All
Courtesy of Professor Bill Buchanan OBE:
Cybersecurity Cloud Lesson 1 rule book in key management for companies:
I had better stop here. So, finally, put a large poster on the wall that says, “no key, means no data!”, “the enemy is within and around you!”, “A breach of the trust infrastructure is one of the most expensive cybersecurity threats to resolve”, “A single key breached, and this company could be finished!”.
Details here: https://lnkd.in/eQWeaq5X
Sounds a lot like Microsoft...
Regards
Caute_Cautim
So, really just one rule, "Your encryption keys are the keys to your castle. So protect them with your life!". All the others are just corollaries that describe various ways in which one may fail to protect them. Great list, though!
Another thing to consider is that more keys, each with a smaller footprint reduces the blast-radius if something is compromised.
While all the points looks good in theory, what makes you think customer can handle and protect the keys to the castle much better than the CSPs? In fact, in practice, many organizations dealing with sensitive information in cloud including the ones that are highly regulated, take the CMK or CSP managed key approach as opposed to CSK.