Articles
In my previous blog, I recommended the use of OASIS KMIP as the go-to standard for delivering interoperability across enterprises (especially larger enterprises) for encryption key management purposes. This is even more critical where there are multiple vendor solutions in the mix. The use of KMIP goes much further than that simple reasoning (I’ll go … Read more
Encryption Key Management (EKM) describes the processes and technologies used in the storage, protection and cataloguing of encryption keys, related cryptographic objects the metadata associated with these keys and objects. Why do we need Encryption Key Management? The building blocks used in the process of encrypting data are an encryption key (generally a long sequence … Read more