SlideShare a Scribd company logo
1 of 8
Download to read offline
Cryptographic
Key Management
Trends in 2020
A joint report from the Cyber Security Competency Group
(CSCG) and Unbound Tech
Introduction
Survey Respondents - By Industry
In September 2019, Unbound Tech surveyed 500
members of the Cyber Security Competency Group
(CSCG), a group of cybersecurity professionals
(analysts, engineers, and architects) from different
industries across North America. The survey
addressed cryptographic key management and
ƬƺȸɎǣˡƬƏɎƺȅƏȇƏǕƺȅƺȇɎȵȸƏƬɎǣƬƺɀِ
Respondents hailed from a variety of industries,
illustrated below. The top 3 industries represented in this
report are Information Technology and Services (20%),
Financial Services (11%), and Computer Software (11%).
What they all had in common, however, is that their
organizations manage cryptographic keys. How they
do it - and how well -- will be addressed in this report.
5%
Did not disclose
5%
Higher Education
2%
Telecommunications
2%
Automation and media distribution
2%
Healthcare Software
2%
Engineering
20%
Information Technology
and services
2%
BioTech
9%
Insurance
11%
Computer software
2%
Pharmaceutical
9%
Research
13%
Financial Services
5%
Healthcare
9%
Retail/Wholesale
Who oversees key management?
Key management generally remains in the hands
of the traditional stakeholders: departments
dedicated to information technology (IT) and/or
security. In the survey conducted in 2019, 62% of
respondents stated that a Chief Information Security
…ǔˡƬƺȸ٢!X³…٣ƏȇƳٖȒȸɎǝƺXÁƳƺȵƏȸɎȅƺȇɎȒǔɎǝƺǣȸ
organization is responsible for key management and
administration within their organization.
Of the remainder, 9% of respondents stated that IT
operations were responsible for key management; 7%
responded that business units were responsible for key
management; 9% of respondents stated that DevOps
or DevSecOps are responsible for key management
(especially in Computer Software companies); 6%
responded “other”; and 5% stated that there was no
ƳƺˡȇƺƳȒɯȇƺȸȒǔɎǝƺǣȸƬȒȅȵƏȇɵ‫ټ‬ɀǸƺɵȅƏȇƏǕƺȅƺȇɎِ
Key Management Owner - By Department
5%
zȒƳƺˡȇƺƳȒɯȇƺȸ
7%
Business Units
62%
CISO / IT Security
9%
IT operations
9%
DevOps/
DevSecOps
2%
Other IT and IT
Security
2%
Other Both IT and other
departments, depending on the
purpose
2%
Other combination of DevOps and IT
2%
CISO / IT Security  Access MGMT
Key management challenges by industry
Key management remains a challenge for most industries – especially for regulated and risk averse
ǣȇƳɖɀɎȸǣƺɀǼǣǸƺ I³X٢ƫƏȇǸǣȇǕًˡȇƏȇƬǣƏǼɀƺȸɮǣƬƺɀۭǣȇɀɖȸƏȇƬƺ٣ƏȇƳǝƺƏǼɎǝƬƏȸƺًƏȇƳǣȇȅɖƬǝǼƺɀɀƺȸƺɴɎƺȇɎɎȒ
ɎƺƬǝ‫ٮ‬ɀƏɮɮɵǣȇƳɖɀɎȸǣƺɀǼǣǸƺXÁƏȇƳƬȒȅȵɖɎƺȸɀȒǔɎɯƏȸƺِÁǝǣɀȸƺȵȒȸɎƺɴƏȅǣȇƺɀɎǝȒɀƺƬǝƏǼǼƺȇǕƺɀƏȇƳȸƺɮƺƏǼɀ
ɯǝǣƬǝɎȸƺȇƳɀȅƏɵƫƺǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬِ
The report found that the less tech-savvy the
ȒȸǕƏȇǣɿƏɎǣȒȇًɎǝƺȅȒȸƺƳǣǔˡƬɖǼɎǣɎɯƏɀǔȒȸɎǝƺȅɎȒ
manage their keys.
• 66% of respondents stated that was a “big” or
“medium” challenge for their enterprise
• Of the 21% who cited lack of key visibility as
a “big” challenge, the majority hailed from
the Financial Services, Healthcare 
Insurance industries
• 45% of respondents said it was a
“medium challenge”
• The only industries which stated it was a “small”
problem or non-issue were Computer Software
and IT professionals - some 29% of respondents
Even IT professionals struggle with visibility of
keys kept in the cloud.
• 57% of respondents stated it was a “big” or
“medium” challenge – including IT professionals
• 12% of respondents stated it was a “big”
challenge- particularly Financial Services (18%)
and Retail (18%) professionals
Managing keys across multiple clouds remains a
challenge as well, with 68% stating it was a “big”
or “medium” challenge, and 24% of respondents
stating that it was a “big” challenge (particularly
ǔȸȒȅIǣȇƏȇƬǣƏǼ³ƺȸɮǣƬƺɀًXȇɀɖȸƏȇƬƺƏȇƳXÁ٣ِ
Multiple clouds present issues of compatibility;
keys created on one cloud are not accessible
from another (or compatible), and vice versa,
creating multiple silos with limited visibility and
segmented auditability.
While keeping keys on multiple clouds may be
the result of utilizing different features from
different cloud service providers (CSPs), reverse
compatibility issues lead to operational and
ȒȸǕƏȇǣɿƏɎǣȒȇƏǼȵȸȒƫǼƺȅɀɮǣɀ‫ٮ‬ơ‫ٮ‬ɮǣɀɎǝȒɀƺǸƺɵɀ‫ټ‬
maintenance in the long-term.
Integrating KM with new services or operations
ȵȸƺɀƺȇɎɀǣɎɀȒɯȇƳǣǔˡƬɖǼɎǣƺɀِ‫ۏאד‬ɀɎƏɎƺƳǣɎɯƏɀƏ
“big” or “medium” challenge.
Cryptography is one of the foundational tools
that organizations can use to protect sensitive
data wherever it resides. Key management in all
organizations has become a critical issue, as the
number of applications – and endpoints – has
skyrocketed with the digital transformation.
While respondents were fairly evenly distributed
across all industries, Insurance, Financial and
Healthcare services particularly cited integration
as a major pain point. One notable exception is
IT and computer software – where the majority
of respondents from those industries rated KM
integration as a “Medium”-level problem.
The same could be said of adapting or
scaling KM to meet enterprise needs
– wherein 45% stated it’s a “big” or
“medium” challenge, and 14% stated it’s
a “Big” challenge.
As the data that needs to be protected increases
in an organization, the number of encryption
keys that need to be maintained increases.
This is compounded by the fact that:
• Organizations are more distributed, with
multiple data centers and even more
applications and services that span them.
• Monolithic applications are giving way to
increasingly distributed, and sometimes
short-lived, microservices such that
organizations must manage keys at wider
scale without compromising security.
• Market demand to offer services and
products that require increasing agility,
scalability and performance—therefore
ȅƏǸǣȇǕǣɎƳǣǔˡƬɖǼɎƏȇƳƬȒȅȵǼƺɴɎȒȅƏȇƏǕƺ
individual keys at the
enterprise scale.
Who’s using which KM solution?
Enterprises may choose to handle this in different
ways, including one or more of the following:
• Key management as a service (KMaaS)
• On-prem enterprise key management system
• Cloud key management system
(deployed on-prem)
• CSP KM
With different cloud service providers and on-
premises sites across multiple geographic
locations, and their respective key management
systems, enterprises lack the ability to manage
their entire cryptographic arsenal across all sites,
all existing HSMs and all workloads on-prem and
in multi-cloud from a single pane of glass. There
is an absence of automatic key sync between
different sites and workloads which results in key
management in silos.
xƏȇɵȒȸǕƏȇǣɿƏɎǣȒȇɀƳȒȇ‫ټ‬ɎǝƏɮƺƏkxɀɵɀɎƺȅ٫ƏȇƳȒǔɎǝȒɀƺɎǝƏɎƳȒًɀȒȅƺɖɀƺȒȇƺȒȸȅȒȸƺƬǼȒɖƳ
KM(1) due to their multi cloud presence, in addition to on-prem KM and cryptographic key storage
systems (e.g. multiple types of HSMs). Indeed, best practices for key management dictate that key
management systems should be present throughout the enterprise, including both on-prem and in
cloud applications.
KMaaS
!ǼȒɖƳkx³ɵɀɎƺȅ٢ƳƺȵǼȒɵƺƳȒȇ‫ٮ‬ȵȸƺȅ٣
On-prem Enterprise KM System
CSP KM
KMaaS
CSP
KM Enc
App SaaS
KM
System
CSP App SaaS
App DB App
KM
CSP #1 CSP #2
KM
Cloud
HSM
(1) Key Management Service of a cloud service provider, such as AWS KMS, Azure Key Vault, GCP KMS, etc.
The diagram below illustrates some common key management structures.
KM Enc
KM
System
Ideally, cryptographic keys would be managed, visible, and able to be administrated via a single pane of glass.
Rƺȸƺ‫ټ‬ɀɯǝƏɎǝƏȵȵƺȇɀǣȇȸƺƏǼǣɎɵ‫ي‬
54% of respondents are using 2 or
more key management systems or
services, whether on-prem or in the
cloud. Of these, most respondents
hailed from the Financial Services, IT,
Insurance, and Healthcare industries.
This is logical because these market
verticals use a large number of
applications (homegrown or 3rd
party), have extensive interfaces with
customers and suppliers, and are part
of a very large eco-system.
25% of respondents said their
organizations are not using a key
management solutions at all,
including most respondents from the
computer software industry.
21% of respondents said their
organizations use one key
management system – 16% on-prem
and just 5% via SaaS vendors.
54% 21%
25%
5%
Use 1 KM -SaaS vendor
16%
Use 1 KM - on prem
54%
Use 2 or more KM
25%
No KM
Percentage of Respondents using a KM System
What are the most important
parameters for choosing a KM solution?
…ȵƺȸƏɎǣȒȇƏǼƺǔˡƬǣƺȇƬɵǣɀǸƺɵǔȒȸkxƬǼǣƺȇɎɀِ«ƺɀȵȒȇƳƺȇɎɀɯƺȸƺƏɀǸƺƳɯǝǣƬǝȒǔɎǝƺǔȒǼǼȒɯǣȇǕ
parameters are the most important in choosing a key management system -- here were the results:
38% prioritize a comprehensive set
of integrations and APIs
Highest industries represented: IT
(18%) and FIS (18%)
32% prioritize ease of administration.
Highest industries represented: FIS,
Insurance, Research, Retail (14% each)
19% cited a “proven security level” -
and 40% of respondents who cited security
as the primary parameter in their decision-
making worked in the IT industry
6% chose a strong
deployment track record
Encryption
When asked about encryption practices in
their organization, results are varied. 59% of
respondents are using encryption products from
multiple vendors – primarily in IT, Insurance
and Financial Services. 39% of respondents say
their companies use the same vendor for key
management and encryption-- and most of
the respondents in this category stem from the
Financial sector, IT, or Research.
The cryptographical world is built on three main
pillars: encryption, key management and key
protection. Vendors that develop all three of these
product lines deliberately created a vendor lock-
in mechanism in such a way that their encryption
tools can be integrated only with their own key
ȅƏȇƏǕƺȅƺȇɎƏȇƳR³xɀِÁǝƺɮƺȇƳȒȸǼȒƬǸ‫ٮ‬ǣȇƳȒƺɀȇ‫ټ‬Ɏ
ɀɎȒȵɎǝƺȸƺ‫ي‬kxȵȸȒɮǣƳƺȸɀƺƏƬǝȸƺȷɖǣȸƺƏɀȵƺƬǣˡƬ
R³xɎȒǣȇɎƺǕȸƏɎƺɯǣɎǝًɯǝǣƬǝɎǝƺȇȸƺȷɖǣȸƺɀȵƺƬǣˡƬ
encryption tools per system, creating closed
ƺƬȒ‫ٮ‬ɀɵɀɎƺȅɀِÁǝƺǔȒǼǼȒɯǣȇǕˡǕɖȸƺƳƺȵǣƬɎɀɎǝƺ
cryptographic stack.
We discovered that FIS, Insurance, and IT
companies using multiple KM systems are likely
using multiple encryption products due to vendor
lock-in. Spreading multiple keys across multiple
platforms or clouds means building entirely
disparate silos – and creating even more of a mess
for key management across the board.
Encryption Tools
Key Management
Key Protection (i.e. HSM, vHSM)
Conclusion
Key management, in all of its aspects, continues
to be a challenge for the burgeoning enterprise –
especially in the midst of the digital transformation.
Ease of use, integration between APIs and various
on-prem and cloud systems, and full transparency
and visibility plague most organizations – especially
those in the Financial, Insurance, Retail and
Healthcare sectors.
Challenges repeatedly arise in these sectors due to a
ƬȒȇˢƏɎǣȒȇȒǔǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬǔƏƬɎȒȸɀِ0ƏƬǝȒǔɎǝƺɀƺ
industries deals with a large number of clients;
each involves a host of regulatory compliance
considerations, both external and internal; each
involves a variety of teams and technologies.
Challenges in the IT and CS industries are likely
due to the wide range of tools, technologies, and
frameworks teams use to deploy security measures
and/or develop code – and the restrictions and
pitfalls of using several cloud-based services, KM,
encryption tools, etc.
Overall, enterprises struggle to manage their
entire cryptographic arsenal across all sites and
systems. The result is wasted expenditure on
duplicate key management products, wasted time
ƏȇƳƺǔˡƬǣƺȇƬɵǼȒɀɎǣȇɎǝƺɀɯǣɎƬǝƫƺɎɯƺƺȇɎȒȒǼɀً
problematic visibility- and, ultimately, compliance
and audit issues. We recommend that each of
these industries look closely at the possibility of
streamlining their security and KM services – if
possible, in a single pane of glass.
contact@unboundtech.com
www.unboundtech.com
Unbound Tech Follow Us

More Related Content

What's hot

Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016rsouthal2003
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析Jordan Pan
 
2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse SurveyInsight
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCxmeteorite
 

What's hot (18)

Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Similar to Cscg cryptographic-key-trends-survey

Challenges and opportunities for European MSPs
Challenges and opportunities for European MSPsChallenges and opportunities for European MSPs
Challenges and opportunities for European MSPsKaspersky
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Top 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxTop 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxDianaRAICU2
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactTata Consultancy Services
 
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...IMARC Group
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a ProductVMware Tanzu
 

Similar to Cscg cryptographic-key-trends-survey (20)

Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Challenges and opportunities for European MSPs
Challenges and opportunities for European MSPsChallenges and opportunities for European MSPs
Challenges and opportunities for European MSPs
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Unifying IT for Digital War Room Performance
Unifying IT for Digital War Room PerformanceUnifying IT for Digital War Room Performance
Unifying IT for Digital War Room Performance
 
Top 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxTop 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptx
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Password in 2022
Password in 2022Password in 2022
Password in 2022
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the Impact
 
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 

More from George Wainblat

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochureGeorge Wainblat
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a trainGeorge Wainblat
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Видео и голосовая система для заключенных
Видео и голосовая система для заключенныхВидео и голосовая система для заключенных
Видео и голосовая система для заключенныхGeorge Wainblat
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management SolutionGeorge Wainblat
 
Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation SolutionsGeorge Wainblat
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 

More from George Wainblat (9)

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a train
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Видео и голосовая система для заключенных
Видео и голосовая система для заключенныхВидео и голосовая система для заключенных
Видео и голосовая система для заключенных
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
 
Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation Solutions
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 

Recently uploaded

Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 

Recently uploaded (20)

Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 

Cscg cryptographic-key-trends-survey

  • 1. Cryptographic Key Management Trends in 2020 A joint report from the Cyber Security Competency Group (CSCG) and Unbound Tech
  • 2. Introduction Survey Respondents - By Industry In September 2019, Unbound Tech surveyed 500 members of the Cyber Security Competency Group (CSCG), a group of cybersecurity professionals (analysts, engineers, and architects) from different industries across North America. The survey addressed cryptographic key management and ƬƺȸɎǣˡƬƏɎƺȅƏȇƏǕƺȅƺȇɎȵȸƏƬɎǣƬƺɀِ Respondents hailed from a variety of industries, illustrated below. The top 3 industries represented in this report are Information Technology and Services (20%), Financial Services (11%), and Computer Software (11%). What they all had in common, however, is that their organizations manage cryptographic keys. How they do it - and how well -- will be addressed in this report. 5% Did not disclose 5% Higher Education 2% Telecommunications 2% Automation and media distribution 2% Healthcare Software 2% Engineering 20% Information Technology and services 2% BioTech 9% Insurance 11% Computer software 2% Pharmaceutical 9% Research 13% Financial Services 5% Healthcare 9% Retail/Wholesale
  • 3. Who oversees key management? Key management generally remains in the hands of the traditional stakeholders: departments dedicated to information technology (IT) and/or security. In the survey conducted in 2019, 62% of respondents stated that a Chief Information Security …ǔˡƬƺȸ٢!X³…٣ƏȇƳٖȒȸɎǝƺXÁƳƺȵƏȸɎȅƺȇɎȒǔɎǝƺǣȸ organization is responsible for key management and administration within their organization. Of the remainder, 9% of respondents stated that IT operations were responsible for key management; 7% responded that business units were responsible for key management; 9% of respondents stated that DevOps or DevSecOps are responsible for key management (especially in Computer Software companies); 6% responded “other”; and 5% stated that there was no ƳƺˡȇƺƳȒɯȇƺȸȒǔɎǝƺǣȸƬȒȅȵƏȇɵ‫ټ‬ɀǸƺɵȅƏȇƏǕƺȅƺȇɎِ Key Management Owner - By Department 5% zȒƳƺˡȇƺƳȒɯȇƺȸ 7% Business Units 62% CISO / IT Security 9% IT operations 9% DevOps/ DevSecOps 2% Other IT and IT Security 2% Other Both IT and other departments, depending on the purpose 2% Other combination of DevOps and IT 2% CISO / IT Security Access MGMT
  • 4. Key management challenges by industry Key management remains a challenge for most industries – especially for regulated and risk averse ǣȇƳɖɀɎȸǣƺɀǼǣǸƺ I³X٢ƫƏȇǸǣȇǕًˡȇƏȇƬǣƏǼɀƺȸɮǣƬƺɀۭǣȇɀɖȸƏȇƬƺ٣ƏȇƳǝƺƏǼɎǝƬƏȸƺًƏȇƳǣȇȅɖƬǝǼƺɀɀƺȸƺɴɎƺȇɎɎȒ ɎƺƬǝ‫ٮ‬ɀƏɮɮɵǣȇƳɖɀɎȸǣƺɀǼǣǸƺXÁƏȇƳƬȒȅȵɖɎƺȸɀȒǔɎɯƏȸƺِÁǝǣɀȸƺȵȒȸɎƺɴƏȅǣȇƺɀɎǝȒɀƺƬǝƏǼǼƺȇǕƺɀƏȇƳȸƺɮƺƏǼɀ ɯǝǣƬǝɎȸƺȇƳɀȅƏɵƫƺǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬِ The report found that the less tech-savvy the ȒȸǕƏȇǣɿƏɎǣȒȇًɎǝƺȅȒȸƺƳǣǔˡƬɖǼɎǣɎɯƏɀǔȒȸɎǝƺȅɎȒ manage their keys. • 66% of respondents stated that was a “big” or “medium” challenge for their enterprise • Of the 21% who cited lack of key visibility as a “big” challenge, the majority hailed from the Financial Services, Healthcare Insurance industries • 45% of respondents said it was a “medium challenge” • The only industries which stated it was a “small” problem or non-issue were Computer Software and IT professionals - some 29% of respondents Even IT professionals struggle with visibility of keys kept in the cloud. • 57% of respondents stated it was a “big” or “medium” challenge – including IT professionals • 12% of respondents stated it was a “big” challenge- particularly Financial Services (18%) and Retail (18%) professionals Managing keys across multiple clouds remains a challenge as well, with 68% stating it was a “big” or “medium” challenge, and 24% of respondents stating that it was a “big” challenge (particularly ǔȸȒȅIǣȇƏȇƬǣƏǼ³ƺȸɮǣƬƺɀًXȇɀɖȸƏȇƬƺƏȇƳXÁ٣ِ Multiple clouds present issues of compatibility; keys created on one cloud are not accessible from another (or compatible), and vice versa, creating multiple silos with limited visibility and segmented auditability. While keeping keys on multiple clouds may be the result of utilizing different features from different cloud service providers (CSPs), reverse compatibility issues lead to operational and ȒȸǕƏȇǣɿƏɎǣȒȇƏǼȵȸȒƫǼƺȅɀɮǣɀ‫ٮ‬ơ‫ٮ‬ɮǣɀɎǝȒɀƺǸƺɵɀ‫ټ‬ maintenance in the long-term. Integrating KM with new services or operations ȵȸƺɀƺȇɎɀǣɎɀȒɯȇƳǣǔˡƬɖǼɎǣƺɀِ‫ۏאד‬ɀɎƏɎƺƳǣɎɯƏɀƏ “big” or “medium” challenge. Cryptography is one of the foundational tools that organizations can use to protect sensitive data wherever it resides. Key management in all organizations has become a critical issue, as the number of applications – and endpoints – has skyrocketed with the digital transformation. While respondents were fairly evenly distributed across all industries, Insurance, Financial and Healthcare services particularly cited integration as a major pain point. One notable exception is IT and computer software – where the majority of respondents from those industries rated KM integration as a “Medium”-level problem.
  • 5. The same could be said of adapting or scaling KM to meet enterprise needs – wherein 45% stated it’s a “big” or “medium” challenge, and 14% stated it’s a “Big” challenge. As the data that needs to be protected increases in an organization, the number of encryption keys that need to be maintained increases. This is compounded by the fact that: • Organizations are more distributed, with multiple data centers and even more applications and services that span them. • Monolithic applications are giving way to increasingly distributed, and sometimes short-lived, microservices such that organizations must manage keys at wider scale without compromising security. • Market demand to offer services and products that require increasing agility, scalability and performance—therefore ȅƏǸǣȇǕǣɎƳǣǔˡƬɖǼɎƏȇƳƬȒȅȵǼƺɴɎȒȅƏȇƏǕƺ individual keys at the enterprise scale. Who’s using which KM solution? Enterprises may choose to handle this in different ways, including one or more of the following: • Key management as a service (KMaaS) • On-prem enterprise key management system • Cloud key management system (deployed on-prem) • CSP KM With different cloud service providers and on- premises sites across multiple geographic locations, and their respective key management systems, enterprises lack the ability to manage their entire cryptographic arsenal across all sites, all existing HSMs and all workloads on-prem and in multi-cloud from a single pane of glass. There is an absence of automatic key sync between different sites and workloads which results in key management in silos. xƏȇɵȒȸǕƏȇǣɿƏɎǣȒȇɀƳȒȇ‫ټ‬ɎǝƏɮƺƏkxɀɵɀɎƺȅ٫ƏȇƳȒǔɎǝȒɀƺɎǝƏɎƳȒًɀȒȅƺɖɀƺȒȇƺȒȸȅȒȸƺƬǼȒɖƳ KM(1) due to their multi cloud presence, in addition to on-prem KM and cryptographic key storage systems (e.g. multiple types of HSMs). Indeed, best practices for key management dictate that key management systems should be present throughout the enterprise, including both on-prem and in cloud applications.
  • 6. KMaaS !ǼȒɖƳkx³ɵɀɎƺȅ٢ƳƺȵǼȒɵƺƳȒȇ‫ٮ‬ȵȸƺȅ٣ On-prem Enterprise KM System CSP KM KMaaS CSP KM Enc App SaaS KM System CSP App SaaS App DB App KM CSP #1 CSP #2 KM Cloud HSM (1) Key Management Service of a cloud service provider, such as AWS KMS, Azure Key Vault, GCP KMS, etc. The diagram below illustrates some common key management structures. KM Enc KM System Ideally, cryptographic keys would be managed, visible, and able to be administrated via a single pane of glass. Rƺȸƺ‫ټ‬ɀɯǝƏɎǝƏȵȵƺȇɀǣȇȸƺƏǼǣɎɵ‫ي‬ 54% of respondents are using 2 or more key management systems or services, whether on-prem or in the cloud. Of these, most respondents hailed from the Financial Services, IT, Insurance, and Healthcare industries. This is logical because these market verticals use a large number of applications (homegrown or 3rd party), have extensive interfaces with customers and suppliers, and are part of a very large eco-system. 25% of respondents said their organizations are not using a key management solutions at all, including most respondents from the computer software industry. 21% of respondents said their organizations use one key management system – 16% on-prem and just 5% via SaaS vendors. 54% 21% 25%
  • 7. 5% Use 1 KM -SaaS vendor 16% Use 1 KM - on prem 54% Use 2 or more KM 25% No KM Percentage of Respondents using a KM System What are the most important parameters for choosing a KM solution? …ȵƺȸƏɎǣȒȇƏǼƺǔˡƬǣƺȇƬɵǣɀǸƺɵǔȒȸkxƬǼǣƺȇɎɀِ«ƺɀȵȒȇƳƺȇɎɀɯƺȸƺƏɀǸƺƳɯǝǣƬǝȒǔɎǝƺǔȒǼǼȒɯǣȇǕ parameters are the most important in choosing a key management system -- here were the results: 38% prioritize a comprehensive set of integrations and APIs Highest industries represented: IT (18%) and FIS (18%) 32% prioritize ease of administration. Highest industries represented: FIS, Insurance, Research, Retail (14% each) 19% cited a “proven security level” - and 40% of respondents who cited security as the primary parameter in their decision- making worked in the IT industry 6% chose a strong deployment track record
  • 8. Encryption When asked about encryption practices in their organization, results are varied. 59% of respondents are using encryption products from multiple vendors – primarily in IT, Insurance and Financial Services. 39% of respondents say their companies use the same vendor for key management and encryption-- and most of the respondents in this category stem from the Financial sector, IT, or Research. The cryptographical world is built on three main pillars: encryption, key management and key protection. Vendors that develop all three of these product lines deliberately created a vendor lock- in mechanism in such a way that their encryption tools can be integrated only with their own key ȅƏȇƏǕƺȅƺȇɎƏȇƳR³xɀِÁǝƺɮƺȇƳȒȸǼȒƬǸ‫ٮ‬ǣȇƳȒƺɀȇ‫ټ‬Ɏ ɀɎȒȵɎǝƺȸƺ‫ي‬kxȵȸȒɮǣƳƺȸɀƺƏƬǝȸƺȷɖǣȸƺƏɀȵƺƬǣˡƬ R³xɎȒǣȇɎƺǕȸƏɎƺɯǣɎǝًɯǝǣƬǝɎǝƺȇȸƺȷɖǣȸƺɀȵƺƬǣˡƬ encryption tools per system, creating closed ƺƬȒ‫ٮ‬ɀɵɀɎƺȅɀِÁǝƺǔȒǼǼȒɯǣȇǕˡǕɖȸƺƳƺȵǣƬɎɀɎǝƺ cryptographic stack. We discovered that FIS, Insurance, and IT companies using multiple KM systems are likely using multiple encryption products due to vendor lock-in. Spreading multiple keys across multiple platforms or clouds means building entirely disparate silos – and creating even more of a mess for key management across the board. Encryption Tools Key Management Key Protection (i.e. HSM, vHSM) Conclusion Key management, in all of its aspects, continues to be a challenge for the burgeoning enterprise – especially in the midst of the digital transformation. Ease of use, integration between APIs and various on-prem and cloud systems, and full transparency and visibility plague most organizations – especially those in the Financial, Insurance, Retail and Healthcare sectors. Challenges repeatedly arise in these sectors due to a ƬȒȇˢƏɎǣȒȇȒǔǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬǔƏƬɎȒȸɀِ0ƏƬǝȒǔɎǝƺɀƺ industries deals with a large number of clients; each involves a host of regulatory compliance considerations, both external and internal; each involves a variety of teams and technologies. Challenges in the IT and CS industries are likely due to the wide range of tools, technologies, and frameworks teams use to deploy security measures and/or develop code – and the restrictions and pitfalls of using several cloud-based services, KM, encryption tools, etc. Overall, enterprises struggle to manage their entire cryptographic arsenal across all sites and systems. The result is wasted expenditure on duplicate key management products, wasted time ƏȇƳƺǔˡƬǣƺȇƬɵǼȒɀɎǣȇɎǝƺɀɯǣɎƬǝƫƺɎɯƺƺȇɎȒȒǼɀً problematic visibility- and, ultimately, compliance and audit issues. We recommend that each of these industries look closely at the possibility of streamlining their security and KM services – if possible, in a single pane of glass. contact@unboundtech.com www.unboundtech.com Unbound Tech Follow Us