About

  • Welcome to the Thales Key Management digital media news centre.

    As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

    This Thales media center provides information on international industry issues and trends relating to the general topic of key management. There's a also a Q & A page here which aims to answer some of the frequently asked questions on the subject. Key management affects organizations across all sectors and this site includes information on global best practices, regulation, technology, deployment scenarios and key management strategy.

    Thales leads in the provision of information and communication systems security solutions for government, defence, critical infrastructure, enterprise and the finance industry. Thales’s comprehensive portfolio of security products and services protect electronic information – safeguarding transactions, IT operations and information transfers within highly sensitive and regulated environments.

    Subscribe by email

    Find out more at http://www.thales-esecurity.com/

    Visit our payments site at www.paymentssecurity.com

« Key Management Strategies in the Cloud Part 3: Trust Everyone, Trust No-one or Trust Someone | Main | Preventing Advanced Persistent Threats: Keep the Code Authentic »

July 01, 2011

Comments

Thanks for sharing your thoughts on this. One key issue that a cloud customer will need to address is how to retain ownership of the data (and responsibility to that) while allowing the service provider to take on the operational and perhaps even the management aspects of daily work.

Similar situation currently exists in bank card production, where a bank may outsource the card issuance to a 3rd party service provider (ie. a card bureau). The process will involve the bank sending to the bureau some sensitive customer data (names, credit numbers, etc), which will be processed by the bureau to print on the bank cards. At the same time, a more complicated process is at work. Here, the bureau will make use of the bank's cryptographic keys to generate codes that are unique to the bank and the card. It is interesting to note that for all the banks I come across, each is insisting to have its own key management box (HSM) to be installed and used at the bureau.

The bureau may end up with having dozens of HSMs installed at its facility, but so far this is an effective way to ensure that ownership and operation can be segregated and the whole operation meets compliance. Until the industry comes up with and accepted a proven and sharable-key-management scheme, this practice is likely to continue.

Hi Welland,

You're absolutely right, people are very keen to extend the same levels of control they have in the datacenter into the cloud. With specialized equipment this obviously starts the break the Cloud model (except perhaps IAAS) becasue you're hevily customizing the service offering.

This is where programmable crypto devices and hardware roots of trust may become valuable tools in the Cloud security arsenal - general purpose devices which can service many applications. The problem, as you say, is defining that interoperable interface.

Until then the standard compromises apply. This will certainly be an interesting side of the industry to shake out long term.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Comments are moderated, and will not appear until the author has approved them.

Key Management Q&A

  • Want to know more about key management? This Q & A might help provide some answers

Categories

Archives

Press contact

  • Liz Harris
    Thales
    +44 (0)1223 723612