Data encryption is the bedrock of cybersecurity. Encrypted data remains worthless ciphertext without access to encryption keys; hardware security modules (HSM) are well-established means for securing those keys in on-premises data centers. Data security teams are well-versed in the process of purchasing, provisioning and managing those HSMs.
Today, developers take advantage of thousands of productivity-enhancing tools and resources and collaborate in real-time with colleagues worldwide to deliver and support software applications and solutions that improve individual lives as well as corporate performance.
As you transition from on-premise computing to cloud computing, securing your data in the cloud is paramount. Since encryption is a preferred way to secure data, encryption key management is a critical concern. Cloud providers have responded to this need with two options: a hardware security module (HSM) or a key management service (KMS). Each approach features benefits and drawbacks.
The 451 Research Pathfinder Advisory report, “Key Management as a Service: A Concept for Modern Encrypted Data Requirements,” cites that more and more enterprise workloads are being placed in the cloud, an estimated 60% by 2018. Given these findings, the time has come for digital businesses to leverage key management as a service for protecting and accessing their data in multiple cloud platforms.