ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Download Publication

Key Management for Public Cloud Migration
Key Management for Public Cloud Migration
Who it's for:
  • Architects of all kinds
  • IT and compliance professionals
  • DevOps engineers
  • CISOs and managers

Key Management for Public Cloud Migration

Release Date: 12/17/2024

More and more organizations are adopting public cloud technologies. This leads to a mass data migration where existing applications that are on-premises or in a data center are moved to the cloud. Throughout the migration, effective key management is critical for mitigating the risk of unauthorized access and data breaches.

This publication shares best practices for managing encryption keys during data migration from on-premises environments to the cloud. It covers considerations for the various stages of the migration process: assessment, planning, preparation, migration, and post-migration. Readers will get a better understanding of how to successfully plan and execute their cloud migration strategy. This ensures the security of their data and a positive cloud adoption experience.

Key Takeaways:
  • How to assess your current data landscape and key management practices, identifying gaps and potential risks
  • The elements of a comprehensive data migration approach
  • How to securely transfer data and encryption keys
  • Testing and validation strategies to guarantee a seamless transition
  • Best practices for maintaining data and key integrity and functionality throughout migration
  • Post-migration best practices
  • The migration tools available and their key features
Download this Resource

Bookmark
Share
Related resources
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
"Set It and Forget It” Access Control is No Longer Enough
"Set It and Forget It” Access Control is No Longer Enough
Published: 08/20/2025
Why You Should Say Goodbye to Manual Identity Processes
Why You Should Say Goodbye to Manual Identity Processes
Published: 08/13/2025
Agentic AI and Zero Trust
Agentic AI and Zero Trust
Published: 08/07/2025
The Ethical and Societal Considerations of an AI Impact Analysis
The Ethical and Societal Considerations of an AI Impact Analysis
Published: 08/05/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training