Key Management Systems

Data security is one of major concerns of enterprises of all sizes, whether they are running their systems in cloud or not. The proliferation of variety of technologies and systems to take care data encryption at rest or in the flight have sprung over the years. Most of these technologies depend on using encryption keys to encrypt and decrypt data. Technologies such HTTP, SSH are all dependent on this. Many organizations also use security certificates as well, stronger password policies are also incorporated.

The usage of security keys is on the rise. Enterprises are now involved managing these keys securely. Key management for enterprises is a certainly an acknowledged problem due to increasing usage of security keys in applications, with no ability to safely store them. Modern enterprise applications are built to use encryption keys (such as SSH keys) for authentication. Systems modules keep them in configuration files or key files to use them. The approaches in both the above cases tend to store them insecurely on their devices causing threat. If they are stored in secure vault, and used, the threat is reduced drastically. Large enterprises having multiple departments, using multiple applications where security keys are used, feel the need managing them in a better ways for security, cost, and compliance perspective. To avoid fragmented key management in the enterprise by bringing consistent and standard ways of managing. This also can bring cost benefit.

There are multiple providers out there in the market addressing this void. The organizations such as CyberArk, Password Manager Pro are some examples. These providers allow enterprises to store the keys in secure vaults include specialized hardware based vaults called Hardware Storage Modules(HSM).

Due to the trend, which is seen since last few years, to move enterprise ecosystems on to the cloud, the enterprises face this issue on cloud too. Recognizing this, cloud providers also have started adding this feature to their kitty. Popular cloud service providers such as AWS and Azure already have these on their services list.

Some of the features such key management systems provide can be:

  1. Highly secure vaults for storing keys
  2. They are maintained in highly available environment, allowing high speed access(preferably HSMs)
  3. Key lifecycle management is supported. Ability to create keys or bring in keys into vault, define key rotation policies, create usage policies
  4. Need to support both private (symmetric) and public (asymmetric) keys.
  5. Comprehensive ReST APIs are required for integrating customer applications which are fault-tolerant, highly available API servers
  6. Integration with security information and event management (SIEM) systems
  7. Audit log, report on access and usage of keys
  8. Need a portal interface to administer keys, define policies etc
  9. Integration with SSO or LDAP systems.

Feel free to share your experiences with key management systems on this.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s