July 2018
Intermediate to advanced
324 pages
9h 31m
English
Malicious use of keys and digital certificates undermines data confidentiality by allowing attackers to break the encryption. Keys must be securely created and deleted, stored, regularly rotated, and access controlled. It is important to understand the storage protections used for keys. Openstack's Barbican and Hashicorp's Vault are examples of open source key management solutions. Amazon Web Service Key Management Service and Microsoft Azure Key Vault are some proprietary examples.
HSMs provide most secured key storage. Crypto processor chips in HSMs provide tamper resistance by deleting keys after tamper detection.
Read now
Unlock full access