Sep 23 2017

What is encryption key management? Definition from #encryption #definition


encryption key management

Encryption key management is the administration of tasks involved with protecting, storing, backing up and organizing encryption keys.

High-profile data losses and regulatory compliance requirements have caused a dramatic increase in the use of encryption in the enterprise. A single enterprise might use several dozen different and possibly incompatible encryption tools, resulting in thousands of encryption keys. Each key must be securely stored, protected and retrievable.

Download this free guide

Drill down into today’s new backup approaches

Due to the features of most modern backup software – which include snapshot management, DR elements, cloud support, VM protection – backups can do so much more than simply restoring data in the event of a storage or server failure. Download this guide and not only discover the latest upgrades to today’s top enterprise backup vendors, but also learn where backup software works best in your computing environment.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy .

There are several encryption key management standards efforts underway. The best known is the Key Management Interoperability Protocol (KMIP) developed by vendors and submitted to the Organization for the Advancement of Structured Information Standards (OASIS ). The goal of KMIP is to allow users to attach any encryption device to a key management system.

Cryptographic key management types

Encryption keys apply complicated algorithms to data and then convert that data into streams of apparently random alphanumeric characters. There are two basic types of cryptographic algorithms: symmetric (private key ) and asymmetric (public key ).

This video from Professor Messer
explains symmetric and asymmetric

Symmetric key algorithms use a single key to secure communications and achieve confidentiality, integrity and authentication. A private key is a variable that is used with an algorithm to encrypt and decrypt code. While the algorithm doesn’t need to be kept secret, the key does.

Asymmetric algorithms provide each user with a public key and a private key. Users can freely distribute the public key, while keeping the private key secret. These key pairs achieve all four goals of cryptography. confidentiality, integrity, authentication and nonrepudiation. A public key infrastructure supports the distribution and identification of public encryption keys, which allow users and computers to securely exchange data over networks such as the internet and verify the other party’s identity.

Encryption key storage and backup

Key management means protecting encryption keys from loss, corruption and unauthorized access. Many processes can be used to control key management, including changing the keys regularly, and managing how keys are assigned and who gets them. In addition, organizations must evaluate whether one key should be used for all backup types or if each type should have its own key.

The importance of encryption key management cannot be overstated. Unless the creation, secure storage, handling and deletion of encryption keys are carefully monitored, unauthorized parties can gain access to them. When keys are lost or corrupted, it can lead to loss of access to systems and data, as well as make a system completely useless unless it is reformatted and reinstalled.

Encryption key management tips

  • Key management is not simple: If encrypting data, somebody must manage the keys, and you must have key recovery procedures in place.
  • Within large businesses, key management processes must be capable of being distributed across multiple business functions with the same standards, rules and quality levels.
  • Have one point of contact for cryptography; don’t spread it among operational users.
  • Ensure the central key repository is well-protected.
  • Decide whether your outsourcer will have any role in key management, such as key pair generation, recovery of keys and escrow access.
  • Decide whether you will have a two person rule for aspects of key management.
  • Decide whether information security should manage keys, as well as encryption policy. In practice, during development, key management is the responsibility of the project, but handed over to security at implementation.

Source: The Corporate IT Forum’s Information Security Service

Having more than one person in charge of storing, backing up, referencing and rotating encryption keys is essential. The roles of key players should be defined, and the encryption key management policy should be accessible to everyone on an intranet site.

A major challenge is the lack of unified tools to reduce management overhead. A key management system purchased from one vendor can’t manage the keys from another vendor because each one implements encryption in a slightly different way.

Recent advancements

Amazon Web Services Key Management Service enables users to create and manage cryptographic keys that protect data in AWS. Encryption keys are generally used in a single region. For example, data encrypted in one region would be encrypted with a different key than a replicated version of that data stored in a different region. The challenge is keeping track of the keys used to encrypt data across regions.

Key aliases alleviate some of the cloud encryption key management burden by allowing administrators to associate a name string with each key. These aliases can be used in multiple regions. Code running in multiple regions doesn’t need to manage multiple keys, and can instead refer to a key alias.

In this AWS video, principal security
solutions architect Bill Shinn
discusses encryption and key management.

Key aliases prove helpful when rotating keys, as it lessens the risk of data leaks due to compromised keys. Key rotation serves the same purpose as changing passwords. If others learn an administrative password, they can access that account for as long as that password is in place. Likewise, a former employee with a copy of an encryption key or someone who obtained a copy of an encryption key can access all the data encrypted with that key.

The AWS Key Management Service allows admins to update a key alias without deleting the previous key first. While key aliases are not keys, their names should be protected. Aliases should be descriptive and easily distinguishable from one another so keys are not applied to the wrong data due to an unclear key alias.

This was last updated in March 2017

Continue Reading About encryption key management

Related Terms

cloud disaster recovery (cloud DR) Cloud DR uses an off-site cloud repository to store copies of data that can be restored on-site to keep the business running in. See complete definition encryption Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone. See complete definition Oracle RMAN (Oracle Recovery Manager) Oracle RMAN (Oracle Recovery Manager) is a utility built into Oracle databases to automate backup and recovery; it includes. See complete definition

Dig Deeper on Data backup security

geetarluke – 3 Apr 2017 12:42 PM

Great article! One thing that I would like to add though, is that the AWS key management service isn’t the only game in town. For organizations that don’t use AWS or want a dedicated (not multi-tenant) solution, there are several other options such as Townsend Security’s Alliance Key Manager, Thales’s nShield Connect Series, as well as solutions offered by other cloud vendors like Microsoft and Google.

When considering other options, it is important to consider a few questions:

  • What other platforms is the solution offered on? For example, is the same product offered in the cloud, VMware, HSM? A solid answer to this question is important as organizations transition from on-prem to cloud/virtual environments.
  • Is the solution FIPS 140-2 compliant or been validated to meet any compliance requirements?
  • What is the reputation of the support team?

Written by CREDIT

Leave a Reply

Your email address will not be published. Required fields are marked *