You’ve been redirected from mobliciti.com. Mobliciti is now part of Kocho. Learn more about our merger.

Lines overlay image

Blog | 3-minute Read

Data sovereignty and the cloud key management problem

"

David Guest

Solution Architect & Technology Evangelist

Published: 20 May 2021

Significant changes have been taking place over the last two decades as an increasing number of organisations turn to the cloud, with many businesses now running on a hybrid cloud state.

This cloud footprint grew organically, initially gaining traction within organisations with Software as a Service (SaaS) solutions, with adoption subsequently growing around the likes of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS).

The COVID-19 pandemic has accelerated the pace of change in recent times. The rapid adoption of video conferencing tools like and Microsoft Teams is testament to this, with the rate of which they were adopted transforming work practices.

The use of this technology also shifted the conversation around the adoption of the cloud services that underpin such tools. The benefits of these became a hot topic, with discussion focused around the ability to scale cloud services quickly and easily.

This push towards the cloud can most clearly be seen in Office 365, with Microsoft shifting the market towards taking the approach of consuming Office 365 as a service. Microsoft is also one of the most widely adopted cloud platforms, with the majority of companies somewhere along their journey to a complete Office 365 installation. Projects are now being delivered globally that are underpinned by various cloud services.

As organisations start to switch over to a cloud-first approach, understanding the foundations of these services, and how to keep them secure is crucial to create solid building blocks. Conversation around the adoption of cloud services should focus on the control of encryption keys and data.

The challenge of data sovereignty

As the move to the cloud progresses, an increasing number of organisations are seeking help with data sovereignty.

Some organisations, such as those within the legal sector, are seeking to gain understanding due to pressure placed on them by clients who may have privacy concerns or are mandating key management.

Organisations also have their own concerns in trusting the handling of sensitive data to cloud providers. In the event of a subpoena, this goes directly to the cloud service provider rather than the organisation, meaning that the organisation has no direct control over whether to give up access to the data.

Data sovereignty is a very real issue that is troubling organisations currently. The Capital One breach was instigated by a rogue admin who gained access to server data, subsequently leaking over 100 million customer records.

Who is responsible for data has become a conversation topic over the last few years.

When it comes to moving data off-premise and into the cloud, who is responsible for it?

When data sits on-premise, an organisation is responsible for the hardware and software to access this. However, as soon as data is moved across to the cloud, the question of responsibility becomes blurred. Ultimately, it is the cloud service provider’s responsibility to ensure that the organisation can access their data. However, the protection and security of this data still lie with the organisation.

For organisations, having the opportunity to be the key custodian whilst also owning the sovereignty of their data allows them to have complete control over who access this data and how.

""

Sign up for great content and exclusive invites

Join the Kocho mailing list for latest news, best practice, and educational resources.

Securing Data in the Cloud

When moving data to the cloud, there are several options surrounding data security:

  • Data stored in the cloud in clear, no keys, no encryption: Only recommended for personal, meaningless data which requires no protection.
  • Data stored in a single cloud, CSP provides encryption, keys and access controls: Allows cloud service provider to provide the encryption of the data. Organisations have no control over encryption keys – they are just using the cloud facility.
  • CSP provides keys and users each use the different access controls for each CSP: Multi-cloud providers ensure that organisations are not locked into a single cloud service provider. However, the use of multiple cloud service providers means that each service requires different ways to manage data and access it, whilst organisations must still give control of the encryption keys to the cloud service provider.
  • Data stored in single cloud, HSM derived key (BYOK), use access controls provided by CSP: A Bring Your Own Key (BYOK) model means that the organisation owns the key, whether that is a hardware security module or a key source. This key may sit on-premise or in the cloud, but importantly, the organisation owns and derives the key, as well as pushing the key into the cloud. This gives organisations ownership of the key material and how that key is being used to encrypt and protect data. This works well for a simplistic single cloud provider approach, however, organisations in this situation must learn how to use this and the back-end services of that cloud service provider.
  • Data stored in multiple clouds, HSM derived keys (BYOK), users each use the different access controls for each CSP: With most companies looking at multiple cloud use, they can take the approach outlined in #4. This presents a demand for organisations to learn how to control and access each individual cloud service provider, which can become an extremely large task.
  • Data stored in the multiple clouds, CCKM provides keys (optionally from HSM) key discovery and management and multi CSP access controls via CCKM single UI: This gives organisations absolute control over their encryption keys, while making multi-cloud use easier, with a Cloud Key Life Cycle Management acting as key broker.

Introducing the CipherTrust Cloud Key Manager platform

Enabling organisations to migrate information to the cloud, whilst being assured that they have complete control over this data and its management is essential. CipherTrust Cloud Key Manager from Thales reduces the labour intensive side of key management and eliminates the need to have a highly-skilled corporate employee to manage this.

The CipherTrust Cloud Key Manager platform allows the centralisation of key management, enabling organisations to protect their data, wherever it resides. This eliminates the necessity of individually managing and understanding each cloud service provider.

The benefits of using the CipherTrust Cloud Key Manager include:

Ebony and green speedometer icon on transparent background

Enjoy enhanced IT efficiency

Centralise encryption key management from multiple environments, presenting all supported clouds and even multiple cloud accounts in a single browser tab.

Advanced cloud key management capabilities include automated key rotation, key expiration handling, and cloud key vault synchronisation, dramatically reducing the time required for cloud key life cycle management.

Full key lifecycle management of native cloud keys as well as keys generated by key sources.

Ebony and green key icon on transparent background

Gain strong key control and security

Delivers key generation, separation of duties, reporting, and key lifecycle management that help fulfil internal and industry data protection mandates, with optional FIPS 140-2-certified secure key sources.

Ebony and green star and shield icon on transparent background

Fulfil best practices

Separate encryption key control from data encryption and decryption operations for compliance, best security practices and control of data.

Gain operational insights on encryption key usage with dashboards, reports and logs.

Ebony and green 'OK,' hand gesture icon on transparent background

Meet organisational needs with flexible deployment options

Available in all-software, cloud-friendly offerings and found in several cloud provider marketplaces for fast instantiation.

Deployment in any cloud is wholly separated from cloud provider access, and keys can be managed in the cloud in which the solution is deployed as well as any other reachable, supported cloud.

For example:

  • A key source may be on-premises for compliance
  • A CipherTrust Cloud Key Manager instance may be deployed in Amazon Web Services or other cloud supported for deployment
  • From there it can manage keys in AWS, Salesforce or Azure or other supported clouds
Ebony and green triple cogs icon on transparent background

Inherently automation-friendly

In addition to its internal automation features which themselves provide crucial IT efficiency gains, operations for both CipherTrust Cloud Key Manager and its key sources may be fully implemented through RESTful API’s.

CipherTrust Cloud Key Manager supports a growing list of IaaS, PaaS and SaaS providers. SaaS solutions include Microsoft Office365, Salesforce.com and Salesforce Sandbox. Supported IaaS/PaaS solutions include Microsoft Azure, Microsoft Azure China National Cloud, Microsoft Azure Stack, IBM Cloud, Google Cloud Platform, and Amazon Web Services.

Using CipherTrust Cloud Key Manager provides the ability for organisations to be the key custodian, offer the lifetime key management of any keys that they are actually placing in the cloud.

 

Like this? Don’t forget to share.

""

Sign up for great content and exclusive invites

Subscribe to the Kocho mailing list if you want to receive:

  • The latest Microsoft tech insights
  • Demos and exclusive event invites
tag icon

Great emails start here

Sign up for free resources and exclusive invites

Subscribe to the Kocho mailing list if you want:

  • Demos of the latest Microsoft tech
  • Invites to exclusive events and webinars
  • Resources that make your job easier
Butterfly overlay image
"

Author

David Guest

David Guest is Kocho’s Solution Architect & Technology Evangelist. He’s responsible for developing identity, Microsoft 365 security, and other cloud service solutions – and keeping our clients abreast of the latest technology trends.

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.