Cryptography, Encryption and Key Management

Logo
Presented by

Akshay Bhardwaj (Security Business Lead, Sprinklr Inc.) and Kerry Steele (Principal, Payments and Cloud Advisory, Coalfire Systems Inc.)

About this talk

In this presentation we explore the Cryptography, Encryption, and Key Management (CEK) domain within the Cloud Control Matrix (CCM) that comprises twenty-one control specifications. The CEK domain focuses on safeguarding Cloud Service Customers' (CSCs) data through cryptographic techniques, encryption, and effective key management. It plays an essential role in ensuring compliance with encryption standards and maintaining the confidentiality and integrity of sensitive information in cloud environments. Under the Shared Security Responsibility Model (SSRM), Cloud Service Providers (CSPs) govern cryptography, encryption, and key management practices, ensuring they align with industry best practices and regulatory standards. CSPs manage the underlying infrastructure, provide secure key storage, and deliver encryption services. Meanwhile, CSCs take responsibility for encrypting their own sensitive data before uploading it to the cloud, managing their encryption keys, and assigning roles and responsibilities within their applications and data. They also oversee cryptographic risk and change management processes specific to their environment. Collaboration between CSPs and CSCs in implementing CEK security controls is mutually beneficial. For CSPs, it strengthens the confidentiality and integrity of CSCs’ data, boosting the security and compliance of cloud services. For CSCs, working with CSPs ensures their unique cryptographic needs are addressed, reinforcing data protection and regulatory compliance.
Related topics:

More from this channel

Upcoming talks (7)
On-demand talks (945)
Subscribers (71361)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa