Key Management
Key generation, storage, and distribution are always critical aspects of a key management system. Here is how our key management system works:
Key Generation
Our key generation procedures are designed to protect against loss, theft and compromise.
Key Length
We use the maximum key length possible – 256 bits.
Key Distribution
Our key management design forces secure distribution of the encryption keys.
Key Storage
We store the encryption keys in a secure key locker appliance. The appliance can be deployed on-premises or within our cloud.
Key Rotation
The encryption keys can be rotated without having to decrypt the encrypted data sets.
Key Revocation
The Server General Security Officer is able to revoke encryption keys at any time.
Key Custodians
Access to encryption keys is restricted to the fewest number of custodians necessary.