ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Recommendations for using a Customer Controlled Key Store
Recommendations for using a Customer Controlled Key Store

Recommendations for using a Customer Controlled Key Store

Release Date: 09/26/2022

Working Group: Cloud Key Management

In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services concerning an organization’s needs for key management - it is the responsibility of the customer to then use encryption keys (or other artifacts, such as secrets) in ways that follow encryption best practices. Coverage includes mainstream business and Information technology (IT) usage of hybrid and cloud technologies. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Key Responsibility Models
Key Responsibility Models
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Prepare for Q-Day with Hybrid Mode Key Exchange
Prepare for Q-Day with Hybrid Mode Key Exchange
Published: 11/17/2025
Achieving Resilience Through Zero Trust
Achieving Resilience Through Zero Trust
Published: 08/29/2025
The Emerging Identity Imperatives of Agentic AI
The Emerging Identity Imperatives of Agentic AI
Published: 08/28/2025
Risk-Based vs. Compliance-Based Security: Why One Size Doesn’t Fit All
Risk-Based vs. Compliance-Based Security: Why One Size Doesn’t Fit All
Published: 08/27/2025

Interested in helping develop research with CSA?

Related Certificates & Training