Heightened awareness of vulnerabilities in sensitive stored data has resulted in the increased application of encryption technology. To secure data at rest, a well-defined process for handling the keys used to encrypt data—as well as the keys used to safeguard the data encryption keys—is essential. With the proper key management controls in place, companies can ensure that data is effectively secured and recoverable.
its key pair to decrypt the data and restore it to its original state. In an IT environment that relies on data encryption as the inal layer of security to prevent the unauthorized viewing of data, access to encryption keys must be considered the equivalent to obtaining access to the cleartext data itself. This is because the encryption algorithms themselves, such as AES or 3DES, are in most cases standardized and publicly available calculations that rely on the application of a unique key and that