Key management practices for encrypted data at rest

There are a lot of government and industry interoperability/security standards and regulations in place. Yet, it seems there is another reported breach of data every week. Yahoo recently reported losing information connected to 500 Million accounts. I have Yahoo, well, I did have Yahoo.

Encrypting your valuable data at rest not only reduces breach damage but it’s viewed as the second highest-rated thing you can do to improve your ROI. Sensitive data needs to be encrypted. Period. Modern day IT is increasingly depending on data centers that are more distributed across physical and virtual worlds. Best practices around your key management strategies will help deliver a much better total cost of ownership when it comes to making investments in and around security. This is especially critical when you need to manage keys in mixed environments both on premise and in the cloud. Protecting data at rest and implementing best practices is also key in helping you meet your compliance requirements when it comes to HIPPA, PCI and GDPR regulations.

I’d like to point to a recent paper by Securosis, Evolving Encryption Key Management Best Practices for the Data Center, where these principles are discussed in much more detail.

Today, there is greater demand for encryption in more locations across your data stacks—which now span physical environments, virtual environments, and increasing barriers—even within traditional environments. Simultaneously, compliance and internal needs also increase the need for compartmentalization and separation of keys, without increasing costs or complexity. Encryption keys must be managed and distributed in ever-more-complex scenarios, such as centralizing enterprise keys, while supporting remote business units encrypting storage locally.

Rich Mogull, CEO of Securosis and Nathan Turajski, Sr. WW Product Manager, HPE Data Security, are giving a webcast on the subject October 20th (1pm EDT/10am PDT). In this presentation, they will summarize independent research highlighting emerging best practices for managing encryption keys and protecting data-at-rest in the face of these new challenges. A few of the things they’ll discuss include:

  • How key management practices are changing to keep pace
  • How to provide the right key, at the right time and location, without compromising security
  • How HPE Enterprise Secure Key Manager (ESKM) can be leveraged to help solve these challenges, providing one of the most certified, validated, and trusted key management solutions today.

You can register for the event here.