SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Cryptographic
Key Management
Trends in 2020
A joint report from the Cyber Security Competency Group
(CSCG) and Unbound Tech
Introduction
Survey Respondents - By Industry
In September 2019, Unbound Tech surveyed 500
members of the Cyber Security Competency Group
(CSCG), a group of cybersecurity professionals
(analysts, engineers, and architects) from different
industries across North America. The survey
addressed cryptographic key management and
ƬƺȸɎǣˡƬƏɎƺȅƏȇƏǕƺȅƺȇɎȵȸƏƬɎǣƬƺɀِ
Respondents hailed from a variety of industries,
illustrated below. The top 3 industries represented in this
report are Information Technology and Services (20%),
Financial Services (11%), and Computer Software (11%).
What they all had in common, however, is that their
organizations manage cryptographic keys. How they
do it - and how well -- will be addressed in this report.
5%
Did not disclose
5%
Higher Education
2%
Telecommunications
2%
Automation and media distribution
2%
Healthcare Software
2%
Engineering
20%
Information Technology
and services
2%
BioTech
9%
Insurance
11%
Computer software
2%
Pharmaceutical
9%
Research
13%
Financial Services
5%
Healthcare
9%
Retail/Wholesale
Who oversees key management?
Key management generally remains in the hands
of the traditional stakeholders: departments
dedicated to information technology (IT) and/or
security. In the survey conducted in 2019, 62% of
respondents stated that a Chief Information Security
…ǔˡƬƺȸ٢!X³…٣ƏȇƳٖȒȸɎǝƺXÁƳƺȵƏȸɎȅƺȇɎȒǔɎǝƺǣȸ
organization is responsible for key management and
administration within their organization.
Of the remainder, 9% of respondents stated that IT
operations were responsible for key management; 7%
responded that business units were responsible for key
management; 9% of respondents stated that DevOps
or DevSecOps are responsible for key management
(especially in Computer Software companies); 6%
responded “other”; and 5% stated that there was no
ƳƺˡȇƺƳȒɯȇƺȸȒǔɎǝƺǣȸƬȒȅȵƏȇɵ‫ټ‬ɀǸƺɵȅƏȇƏǕƺȅƺȇɎِ
Key Management Owner - By Department
5%
zȒƳƺˡȇƺƳȒɯȇƺȸ
7%
Business Units
62%
CISO / IT Security
9%
IT operations
9%
DevOps/
DevSecOps
2%
Other IT and IT
Security
2%
Other Both IT and other
departments, depending on the
purpose
2%
Other combination of DevOps and IT
2%
CISO / IT Security  Access MGMT
Key management challenges by industry
Key management remains a challenge for most industries – especially for regulated and risk averse
ǣȇƳɖɀɎȸǣƺɀǼǣǸƺ I³X٢ƫƏȇǸǣȇǕًˡȇƏȇƬǣƏǼɀƺȸɮǣƬƺɀۭǣȇɀɖȸƏȇƬƺ٣ƏȇƳǝƺƏǼɎǝƬƏȸƺًƏȇƳǣȇȅɖƬǝǼƺɀɀƺȸƺɴɎƺȇɎɎȒ
ɎƺƬǝ‫ٮ‬ɀƏɮɮɵǣȇƳɖɀɎȸǣƺɀǼǣǸƺXÁƏȇƳƬȒȅȵɖɎƺȸɀȒǔɎɯƏȸƺِÁǝǣɀȸƺȵȒȸɎƺɴƏȅǣȇƺɀɎǝȒɀƺƬǝƏǼǼƺȇǕƺɀƏȇƳȸƺɮƺƏǼɀ
ɯǝǣƬǝɎȸƺȇƳɀȅƏɵƫƺǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬِ
The report found that the less tech-savvy the
ȒȸǕƏȇǣɿƏɎǣȒȇًɎǝƺȅȒȸƺƳǣǔˡƬɖǼɎǣɎɯƏɀǔȒȸɎǝƺȅɎȒ
manage their keys.
• 66% of respondents stated that was a “big” or
“medium” challenge for their enterprise
• Of the 21% who cited lack of key visibility as
a “big” challenge, the majority hailed from
the Financial Services, Healthcare 
Insurance industries
• 45% of respondents said it was a
“medium challenge”
• The only industries which stated it was a “small”
problem or non-issue were Computer Software
and IT professionals - some 29% of respondents
Even IT professionals struggle with visibility of
keys kept in the cloud.
• 57% of respondents stated it was a “big” or
“medium” challenge – including IT professionals
• 12% of respondents stated it was a “big”
challenge- particularly Financial Services (18%)
and Retail (18%) professionals
Managing keys across multiple clouds remains a
challenge as well, with 68% stating it was a “big”
or “medium” challenge, and 24% of respondents
stating that it was a “big” challenge (particularly
ǔȸȒȅIǣȇƏȇƬǣƏǼ³ƺȸɮǣƬƺɀًXȇɀɖȸƏȇƬƺƏȇƳXÁ٣ِ
Multiple clouds present issues of compatibility;
keys created on one cloud are not accessible
from another (or compatible), and vice versa,
creating multiple silos with limited visibility and
segmented auditability.
While keeping keys on multiple clouds may be
the result of utilizing different features from
different cloud service providers (CSPs), reverse
compatibility issues lead to operational and
ȒȸǕƏȇǣɿƏɎǣȒȇƏǼȵȸȒƫǼƺȅɀɮǣɀ‫ٮ‬ơ‫ٮ‬ɮǣɀɎǝȒɀƺǸƺɵɀ‫ټ‬
maintenance in the long-term.
Integrating KM with new services or operations
ȵȸƺɀƺȇɎɀǣɎɀȒɯȇƳǣǔˡƬɖǼɎǣƺɀِ‫ۏאד‬ɀɎƏɎƺƳǣɎɯƏɀƏ
“big” or “medium” challenge.
Cryptography is one of the foundational tools
that organizations can use to protect sensitive
data wherever it resides. Key management in all
organizations has become a critical issue, as the
number of applications – and endpoints – has
skyrocketed with the digital transformation.
While respondents were fairly evenly distributed
across all industries, Insurance, Financial and
Healthcare services particularly cited integration
as a major pain point. One notable exception is
IT and computer software – where the majority
of respondents from those industries rated KM
integration as a “Medium”-level problem.
The same could be said of adapting or
scaling KM to meet enterprise needs
– wherein 45% stated it’s a “big” or
“medium” challenge, and 14% stated it’s
a “Big” challenge.
As the data that needs to be protected increases
in an organization, the number of encryption
keys that need to be maintained increases.
This is compounded by the fact that:
• Organizations are more distributed, with
multiple data centers and even more
applications and services that span them.
• Monolithic applications are giving way to
increasingly distributed, and sometimes
short-lived, microservices such that
organizations must manage keys at wider
scale without compromising security.
• Market demand to offer services and
products that require increasing agility,
scalability and performance—therefore
ȅƏǸǣȇǕǣɎƳǣǔˡƬɖǼɎƏȇƳƬȒȅȵǼƺɴɎȒȅƏȇƏǕƺ
individual keys at the
enterprise scale.
Who’s using which KM solution?
Enterprises may choose to handle this in different
ways, including one or more of the following:
• Key management as a service (KMaaS)
• On-prem enterprise key management system
• Cloud key management system
(deployed on-prem)
• CSP KM
With different cloud service providers and on-
premises sites across multiple geographic
locations, and their respective key management
systems, enterprises lack the ability to manage
their entire cryptographic arsenal across all sites,
all existing HSMs and all workloads on-prem and
in multi-cloud from a single pane of glass. There
is an absence of automatic key sync between
different sites and workloads which results in key
management in silos.
xƏȇɵȒȸǕƏȇǣɿƏɎǣȒȇɀƳȒȇ‫ټ‬ɎǝƏɮƺƏkxɀɵɀɎƺȅ٫ƏȇƳȒǔɎǝȒɀƺɎǝƏɎƳȒًɀȒȅƺɖɀƺȒȇƺȒȸȅȒȸƺƬǼȒɖƳ
KM(1) due to their multi cloud presence, in addition to on-prem KM and cryptographic key storage
systems (e.g. multiple types of HSMs). Indeed, best practices for key management dictate that key
management systems should be present throughout the enterprise, including both on-prem and in
cloud applications.
KMaaS
!ǼȒɖƳkx³ɵɀɎƺȅ٢ƳƺȵǼȒɵƺƳȒȇ‫ٮ‬ȵȸƺȅ٣
On-prem Enterprise KM System
CSP KM
KMaaS
CSP
KM Enc
App SaaS
KM
System
CSP App SaaS
App DB App
KM
CSP #1 CSP #2
KM
Cloud
HSM
(1) Key Management Service of a cloud service provider, such as AWS KMS, Azure Key Vault, GCP KMS, etc.
The diagram below illustrates some common key management structures.
KM Enc
KM
System
Ideally, cryptographic keys would be managed, visible, and able to be administrated via a single pane of glass.
Rƺȸƺ‫ټ‬ɀɯǝƏɎǝƏȵȵƺȇɀǣȇȸƺƏǼǣɎɵ‫ي‬
54% of respondents are using 2 or
more key management systems or
services, whether on-prem or in the
cloud. Of these, most respondents
hailed from the Financial Services, IT,
Insurance, and Healthcare industries.
This is logical because these market
verticals use a large number of
applications (homegrown or 3rd
party), have extensive interfaces with
customers and suppliers, and are part
of a very large eco-system.
25% of respondents said their
organizations are not using a key
management solutions at all,
including most respondents from the
computer software industry.
21% of respondents said their
organizations use one key
management system – 16% on-prem
and just 5% via SaaS vendors.
54% 21%
25%
5%
Use 1 KM -SaaS vendor
16%
Use 1 KM - on prem
54%
Use 2 or more KM
25%
No KM
Percentage of Respondents using a KM System
What are the most important
parameters for choosing a KM solution?
…ȵƺȸƏɎǣȒȇƏǼƺǔˡƬǣƺȇƬɵǣɀǸƺɵǔȒȸkxƬǼǣƺȇɎɀِ«ƺɀȵȒȇƳƺȇɎɀɯƺȸƺƏɀǸƺƳɯǝǣƬǝȒǔɎǝƺǔȒǼǼȒɯǣȇǕ
parameters are the most important in choosing a key management system -- here were the results:
38% prioritize a comprehensive set
of integrations and APIs
Highest industries represented: IT
(18%) and FIS (18%)
32% prioritize ease of administration.
Highest industries represented: FIS,
Insurance, Research, Retail (14% each)
19% cited a “proven security level” -
and 40% of respondents who cited security
as the primary parameter in their decision-
making worked in the IT industry
6% chose a strong
deployment track record
Encryption
When asked about encryption practices in
their organization, results are varied. 59% of
respondents are using encryption products from
multiple vendors – primarily in IT, Insurance
and Financial Services. 39% of respondents say
their companies use the same vendor for key
management and encryption-- and most of
the respondents in this category stem from the
Financial sector, IT, or Research.
The cryptographical world is built on three main
pillars: encryption, key management and key
protection. Vendors that develop all three of these
product lines deliberately created a vendor lock-
in mechanism in such a way that their encryption
tools can be integrated only with their own key
ȅƏȇƏǕƺȅƺȇɎƏȇƳR³xɀِÁǝƺɮƺȇƳȒȸǼȒƬǸ‫ٮ‬ǣȇƳȒƺɀȇ‫ټ‬Ɏ
ɀɎȒȵɎǝƺȸƺ‫ي‬kxȵȸȒɮǣƳƺȸɀƺƏƬǝȸƺȷɖǣȸƺƏɀȵƺƬǣˡƬ
R³xɎȒǣȇɎƺǕȸƏɎƺɯǣɎǝًɯǝǣƬǝɎǝƺȇȸƺȷɖǣȸƺɀȵƺƬǣˡƬ
encryption tools per system, creating closed
ƺƬȒ‫ٮ‬ɀɵɀɎƺȅɀِÁǝƺǔȒǼǼȒɯǣȇǕˡǕɖȸƺƳƺȵǣƬɎɀɎǝƺ
cryptographic stack.
We discovered that FIS, Insurance, and IT
companies using multiple KM systems are likely
using multiple encryption products due to vendor
lock-in. Spreading multiple keys across multiple
platforms or clouds means building entirely
disparate silos – and creating even more of a mess
for key management across the board.
Encryption Tools
Key Management
Key Protection (i.e. HSM, vHSM)
Conclusion
Key management, in all of its aspects, continues
to be a challenge for the burgeoning enterprise –
especially in the midst of the digital transformation.
Ease of use, integration between APIs and various
on-prem and cloud systems, and full transparency
and visibility plague most organizations – especially
those in the Financial, Insurance, Retail and
Healthcare sectors.
Challenges repeatedly arise in these sectors due to a
ƬȒȇˢƏɎǣȒȇȒǔǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬǔƏƬɎȒȸɀِ0ƏƬǝȒǔɎǝƺɀƺ
industries deals with a large number of clients;
each involves a host of regulatory compliance
considerations, both external and internal; each
involves a variety of teams and technologies.
Challenges in the IT and CS industries are likely
due to the wide range of tools, technologies, and
frameworks teams use to deploy security measures
and/or develop code – and the restrictions and
pitfalls of using several cloud-based services, KM,
encryption tools, etc.
Overall, enterprises struggle to manage their
entire cryptographic arsenal across all sites and
systems. The result is wasted expenditure on
duplicate key management products, wasted time
ƏȇƳƺǔˡƬǣƺȇƬɵǼȒɀɎǣȇɎǝƺɀɯǣɎƬǝƫƺɎɯƺƺȇɎȒȒǼɀً
problematic visibility- and, ultimately, compliance
and audit issues. We recommend that each of
these industries look closely at the possibility of
streamlining their security and KM services – if
possible, in a single pane of glass.
contact@unboundtech.com
www.unboundtech.com
Unbound Tech Follow Us

Contenu connexe

Tendances

Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016rsouthal2003
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析Jordan Pan
 
2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse SurveyInsight
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKHappiest Minds Technologies
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCxmeteorite
 

Tendances (18)

Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey2018 Insight Intelligent Technology Pulse Survey
2018 Insight Intelligent Technology Pulse Survey
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Automating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UKAutomating SOC1/2 Compliance- For a leading Software solution company in UK
Automating SOC1/2 Compliance- For a leading Software solution company in UK
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Similaire à Cscg cryptographic-key-trends-survey

Challenges and opportunities for European MSPs
Challenges and opportunities for European MSPsChallenges and opportunities for European MSPs
Challenges and opportunities for European MSPsKaspersky
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Top 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxTop 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxDianaRAICU2
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationCloudLock
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactTata Consultancy Services
 
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...IMARC Group
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarLumension
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index Insight
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The Economist Media Businesses
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a ProductVMware Tanzu
 

Similaire à Cscg cryptographic-key-trends-survey (20)

Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Challenges and opportunities for European MSPs
Challenges and opportunities for European MSPsChallenges and opportunities for European MSPs
Challenges and opportunities for European MSPs
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Unifying IT for Digital War Room Performance
Unifying IT for Digital War Room PerformanceUnifying IT for Digital War Room Performance
Unifying IT for Digital War Room Performance
 
Top 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptxTop 5 trends impacting multicloud management.pptx
Top 5 trends impacting multicloud management.pptx
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
Password in 2022
Password in 2022Password in 2022
Password in 2022
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the Impact
 
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
Security Information and Event Management (SIEM) Market PPT: Growth, Outlook,...
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Evolving State of the Endpoint Webinar
Evolving State of the Endpoint WebinarEvolving State of the Endpoint Webinar
Evolving State of the Endpoint Webinar
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...The cyber-chasm: How the disconnect between the C-suite and security endanger...
The cyber-chasm: How the disconnect between the C-suite and security endanger...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 

Plus de George Wainblat

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochureGeorge Wainblat
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperGeorge Wainblat
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochureGeorge Wainblat
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a trainGeorge Wainblat
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Видео и голосовая система для заключенных
Видео и голосовая система для заключенныхВидео и голосовая система для заключенных
Видео и голосовая система для заключенныхGeorge Wainblat
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management SolutionGeorge Wainblat
 
Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation SolutionsGeorge Wainblat
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 

Plus de George Wainblat (9)

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
Light sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paperLight sec for utilities and critical infrastructure white paper
Light sec for utilities and critical infrastructure white paper
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Browsing the web from a train
Browsing the web from a trainBrowsing the web from a train
Browsing the web from a train
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Видео и голосовая система для заключенных
Видео и голосовая система для заключенныхВидео и голосовая система для заключенных
Видео и голосовая система для заключенных
 
Healthcare Assets Management Solution
Healthcare Assets Management SolutionHealthcare Assets Management Solution
Healthcare Assets Management Solution
 
Connected Urban Transportation Solutions
Connected Urban Transportation SolutionsConnected Urban Transportation Solutions
Connected Urban Transportation Solutions
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 

Dernier

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 

Dernier (20)

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

Cscg cryptographic-key-trends-survey

  • 1. Cryptographic Key Management Trends in 2020 A joint report from the Cyber Security Competency Group (CSCG) and Unbound Tech
  • 2. Introduction Survey Respondents - By Industry In September 2019, Unbound Tech surveyed 500 members of the Cyber Security Competency Group (CSCG), a group of cybersecurity professionals (analysts, engineers, and architects) from different industries across North America. The survey addressed cryptographic key management and ƬƺȸɎǣˡƬƏɎƺȅƏȇƏǕƺȅƺȇɎȵȸƏƬɎǣƬƺɀِ Respondents hailed from a variety of industries, illustrated below. The top 3 industries represented in this report are Information Technology and Services (20%), Financial Services (11%), and Computer Software (11%). What they all had in common, however, is that their organizations manage cryptographic keys. How they do it - and how well -- will be addressed in this report. 5% Did not disclose 5% Higher Education 2% Telecommunications 2% Automation and media distribution 2% Healthcare Software 2% Engineering 20% Information Technology and services 2% BioTech 9% Insurance 11% Computer software 2% Pharmaceutical 9% Research 13% Financial Services 5% Healthcare 9% Retail/Wholesale
  • 3. Who oversees key management? Key management generally remains in the hands of the traditional stakeholders: departments dedicated to information technology (IT) and/or security. In the survey conducted in 2019, 62% of respondents stated that a Chief Information Security …ǔˡƬƺȸ٢!X³…٣ƏȇƳٖȒȸɎǝƺXÁƳƺȵƏȸɎȅƺȇɎȒǔɎǝƺǣȸ organization is responsible for key management and administration within their organization. Of the remainder, 9% of respondents stated that IT operations were responsible for key management; 7% responded that business units were responsible for key management; 9% of respondents stated that DevOps or DevSecOps are responsible for key management (especially in Computer Software companies); 6% responded “other”; and 5% stated that there was no ƳƺˡȇƺƳȒɯȇƺȸȒǔɎǝƺǣȸƬȒȅȵƏȇɵ‫ټ‬ɀǸƺɵȅƏȇƏǕƺȅƺȇɎِ Key Management Owner - By Department 5% zȒƳƺˡȇƺƳȒɯȇƺȸ 7% Business Units 62% CISO / IT Security 9% IT operations 9% DevOps/ DevSecOps 2% Other IT and IT Security 2% Other Both IT and other departments, depending on the purpose 2% Other combination of DevOps and IT 2% CISO / IT Security Access MGMT
  • 4. Key management challenges by industry Key management remains a challenge for most industries – especially for regulated and risk averse ǣȇƳɖɀɎȸǣƺɀǼǣǸƺ I³X٢ƫƏȇǸǣȇǕًˡȇƏȇƬǣƏǼɀƺȸɮǣƬƺɀۭǣȇɀɖȸƏȇƬƺ٣ƏȇƳǝƺƏǼɎǝƬƏȸƺًƏȇƳǣȇȅɖƬǝǼƺɀɀƺȸƺɴɎƺȇɎɎȒ ɎƺƬǝ‫ٮ‬ɀƏɮɮɵǣȇƳɖɀɎȸǣƺɀǼǣǸƺXÁƏȇƳƬȒȅȵɖɎƺȸɀȒǔɎɯƏȸƺِÁǝǣɀȸƺȵȒȸɎƺɴƏȅǣȇƺɀɎǝȒɀƺƬǝƏǼǼƺȇǕƺɀƏȇƳȸƺɮƺƏǼɀ ɯǝǣƬǝɎȸƺȇƳɀȅƏɵƫƺǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬِ The report found that the less tech-savvy the ȒȸǕƏȇǣɿƏɎǣȒȇًɎǝƺȅȒȸƺƳǣǔˡƬɖǼɎǣɎɯƏɀǔȒȸɎǝƺȅɎȒ manage their keys. • 66% of respondents stated that was a “big” or “medium” challenge for their enterprise • Of the 21% who cited lack of key visibility as a “big” challenge, the majority hailed from the Financial Services, Healthcare Insurance industries • 45% of respondents said it was a “medium challenge” • The only industries which stated it was a “small” problem or non-issue were Computer Software and IT professionals - some 29% of respondents Even IT professionals struggle with visibility of keys kept in the cloud. • 57% of respondents stated it was a “big” or “medium” challenge – including IT professionals • 12% of respondents stated it was a “big” challenge- particularly Financial Services (18%) and Retail (18%) professionals Managing keys across multiple clouds remains a challenge as well, with 68% stating it was a “big” or “medium” challenge, and 24% of respondents stating that it was a “big” challenge (particularly ǔȸȒȅIǣȇƏȇƬǣƏǼ³ƺȸɮǣƬƺɀًXȇɀɖȸƏȇƬƺƏȇƳXÁ٣ِ Multiple clouds present issues of compatibility; keys created on one cloud are not accessible from another (or compatible), and vice versa, creating multiple silos with limited visibility and segmented auditability. While keeping keys on multiple clouds may be the result of utilizing different features from different cloud service providers (CSPs), reverse compatibility issues lead to operational and ȒȸǕƏȇǣɿƏɎǣȒȇƏǼȵȸȒƫǼƺȅɀɮǣɀ‫ٮ‬ơ‫ٮ‬ɮǣɀɎǝȒɀƺǸƺɵɀ‫ټ‬ maintenance in the long-term. Integrating KM with new services or operations ȵȸƺɀƺȇɎɀǣɎɀȒɯȇƳǣǔˡƬɖǼɎǣƺɀِ‫ۏאד‬ɀɎƏɎƺƳǣɎɯƏɀƏ “big” or “medium” challenge. Cryptography is one of the foundational tools that organizations can use to protect sensitive data wherever it resides. Key management in all organizations has become a critical issue, as the number of applications – and endpoints – has skyrocketed with the digital transformation. While respondents were fairly evenly distributed across all industries, Insurance, Financial and Healthcare services particularly cited integration as a major pain point. One notable exception is IT and computer software – where the majority of respondents from those industries rated KM integration as a “Medium”-level problem.
  • 5. The same could be said of adapting or scaling KM to meet enterprise needs – wherein 45% stated it’s a “big” or “medium” challenge, and 14% stated it’s a “Big” challenge. As the data that needs to be protected increases in an organization, the number of encryption keys that need to be maintained increases. This is compounded by the fact that: • Organizations are more distributed, with multiple data centers and even more applications and services that span them. • Monolithic applications are giving way to increasingly distributed, and sometimes short-lived, microservices such that organizations must manage keys at wider scale without compromising security. • Market demand to offer services and products that require increasing agility, scalability and performance—therefore ȅƏǸǣȇǕǣɎƳǣǔˡƬɖǼɎƏȇƳƬȒȅȵǼƺɴɎȒȅƏȇƏǕƺ individual keys at the enterprise scale. Who’s using which KM solution? Enterprises may choose to handle this in different ways, including one or more of the following: • Key management as a service (KMaaS) • On-prem enterprise key management system • Cloud key management system (deployed on-prem) • CSP KM With different cloud service providers and on- premises sites across multiple geographic locations, and their respective key management systems, enterprises lack the ability to manage their entire cryptographic arsenal across all sites, all existing HSMs and all workloads on-prem and in multi-cloud from a single pane of glass. There is an absence of automatic key sync between different sites and workloads which results in key management in silos. xƏȇɵȒȸǕƏȇǣɿƏɎǣȒȇɀƳȒȇ‫ټ‬ɎǝƏɮƺƏkxɀɵɀɎƺȅ٫ƏȇƳȒǔɎǝȒɀƺɎǝƏɎƳȒًɀȒȅƺɖɀƺȒȇƺȒȸȅȒȸƺƬǼȒɖƳ KM(1) due to their multi cloud presence, in addition to on-prem KM and cryptographic key storage systems (e.g. multiple types of HSMs). Indeed, best practices for key management dictate that key management systems should be present throughout the enterprise, including both on-prem and in cloud applications.
  • 6. KMaaS !ǼȒɖƳkx³ɵɀɎƺȅ٢ƳƺȵǼȒɵƺƳȒȇ‫ٮ‬ȵȸƺȅ٣ On-prem Enterprise KM System CSP KM KMaaS CSP KM Enc App SaaS KM System CSP App SaaS App DB App KM CSP #1 CSP #2 KM Cloud HSM (1) Key Management Service of a cloud service provider, such as AWS KMS, Azure Key Vault, GCP KMS, etc. The diagram below illustrates some common key management structures. KM Enc KM System Ideally, cryptographic keys would be managed, visible, and able to be administrated via a single pane of glass. Rƺȸƺ‫ټ‬ɀɯǝƏɎǝƏȵȵƺȇɀǣȇȸƺƏǼǣɎɵ‫ي‬ 54% of respondents are using 2 or more key management systems or services, whether on-prem or in the cloud. Of these, most respondents hailed from the Financial Services, IT, Insurance, and Healthcare industries. This is logical because these market verticals use a large number of applications (homegrown or 3rd party), have extensive interfaces with customers and suppliers, and are part of a very large eco-system. 25% of respondents said their organizations are not using a key management solutions at all, including most respondents from the computer software industry. 21% of respondents said their organizations use one key management system – 16% on-prem and just 5% via SaaS vendors. 54% 21% 25%
  • 7. 5% Use 1 KM -SaaS vendor 16% Use 1 KM - on prem 54% Use 2 or more KM 25% No KM Percentage of Respondents using a KM System What are the most important parameters for choosing a KM solution? …ȵƺȸƏɎǣȒȇƏǼƺǔˡƬǣƺȇƬɵǣɀǸƺɵǔȒȸkxƬǼǣƺȇɎɀِ«ƺɀȵȒȇƳƺȇɎɀɯƺȸƺƏɀǸƺƳɯǝǣƬǝȒǔɎǝƺǔȒǼǼȒɯǣȇǕ parameters are the most important in choosing a key management system -- here were the results: 38% prioritize a comprehensive set of integrations and APIs Highest industries represented: IT (18%) and FIS (18%) 32% prioritize ease of administration. Highest industries represented: FIS, Insurance, Research, Retail (14% each) 19% cited a “proven security level” - and 40% of respondents who cited security as the primary parameter in their decision- making worked in the IT industry 6% chose a strong deployment track record
  • 8. Encryption When asked about encryption practices in their organization, results are varied. 59% of respondents are using encryption products from multiple vendors – primarily in IT, Insurance and Financial Services. 39% of respondents say their companies use the same vendor for key management and encryption-- and most of the respondents in this category stem from the Financial sector, IT, or Research. The cryptographical world is built on three main pillars: encryption, key management and key protection. Vendors that develop all three of these product lines deliberately created a vendor lock- in mechanism in such a way that their encryption tools can be integrated only with their own key ȅƏȇƏǕƺȅƺȇɎƏȇƳR³xɀِÁǝƺɮƺȇƳȒȸǼȒƬǸ‫ٮ‬ǣȇƳȒƺɀȇ‫ټ‬Ɏ ɀɎȒȵɎǝƺȸƺ‫ي‬kxȵȸȒɮǣƳƺȸɀƺƏƬǝȸƺȷɖǣȸƺƏɀȵƺƬǣˡƬ R³xɎȒǣȇɎƺǕȸƏɎƺɯǣɎǝًɯǝǣƬǝɎǝƺȇȸƺȷɖǣȸƺɀȵƺƬǣˡƬ encryption tools per system, creating closed ƺƬȒ‫ٮ‬ɀɵɀɎƺȅɀِÁǝƺǔȒǼǼȒɯǣȇǕˡǕɖȸƺƳƺȵǣƬɎɀɎǝƺ cryptographic stack. We discovered that FIS, Insurance, and IT companies using multiple KM systems are likely using multiple encryption products due to vendor lock-in. Spreading multiple keys across multiple platforms or clouds means building entirely disparate silos – and creating even more of a mess for key management across the board. Encryption Tools Key Management Key Protection (i.e. HSM, vHSM) Conclusion Key management, in all of its aspects, continues to be a challenge for the burgeoning enterprise – especially in the midst of the digital transformation. Ease of use, integration between APIs and various on-prem and cloud systems, and full transparency and visibility plague most organizations – especially those in the Financial, Insurance, Retail and Healthcare sectors. Challenges repeatedly arise in these sectors due to a ƬȒȇˢƏɎǣȒȇȒǔǣȇƳɖɀɎȸɵ‫ٮ‬ɀȵƺƬǣˡƬǔƏƬɎȒȸɀِ0ƏƬǝȒǔɎǝƺɀƺ industries deals with a large number of clients; each involves a host of regulatory compliance considerations, both external and internal; each involves a variety of teams and technologies. Challenges in the IT and CS industries are likely due to the wide range of tools, technologies, and frameworks teams use to deploy security measures and/or develop code – and the restrictions and pitfalls of using several cloud-based services, KM, encryption tools, etc. Overall, enterprises struggle to manage their entire cryptographic arsenal across all sites and systems. The result is wasted expenditure on duplicate key management products, wasted time ƏȇƳƺǔˡƬǣƺȇƬɵǼȒɀɎǣȇɎǝƺɀɯǣɎƬǝƫƺɎɯƺƺȇɎȒȒǼɀً problematic visibility- and, ultimately, compliance and audit issues. We recommend that each of these industries look closely at the possibility of streamlining their security and KM services – if possible, in a single pane of glass. contact@unboundtech.com www.unboundtech.com Unbound Tech Follow Us