![]() Should encrypted data be stolen along with its key, the encryption itself is rendered useless. Otherwise, each of those points in your scattered data stacks can become a possible point of human error or malicious access. With all those disparate data sources, a consistent approach to encryption key management helps maintain control over your data and encryption keys. Implementing encryption at various levels, such as databases, networks, endpoints, and files increases data security-at the cost of key management complexity. According to the US General Services Administration ( GSA), key management is at least as important as the confidentiality and integrity of the data that the encryption keys protect. As such, access to keys must be carefully monitored and controlled. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |