What are the important aspects of an encryption key management policy?
Please feel free to post any thoughts on what you believe should be included in an encryption key management policy. Thanks in advance.
- What are the elements of a good backup policy? Is keeping keys in escrow enough? Or is a more immediately available backup needed as well?
- What kind of physical and logical access controls (or other measures) should be implemented around the keys to prevent unauthorized access, modification, duplication, or destruction of the keys?
- What are the elements of a good process for destroying keys that are old or may have been compromised? Should keys be periodically updated and replaced to further mitigate the threat of unauthorized duplicates?
- What are the best software solutions in the marketplace for managing encryption keys? What aspects of a software solution are most important?
- Who should be the ultimate approver for access to the keys? Particularly if the software owner and database owner are not the same person/group; which group should own the keys, related processes, and approval role?
No comments:
Post a Comment