"Hold your own key" as a Service

"Hold your own key" as a Service

Cloud2
Cloud2

12 Feb 2023

2 min read

Amazon Web Services (AWS) has recently launched its new External Key Store (XKS) solution, providing customers with a hold-your-own-key option for extended data encryption. This key management service (KMS) provides customers with a higher level of control over their data and helps them meet compliance requirements like GDPR etc. Cloud2 is proud to present the most advanced XKS solution on the market. The solution is based on technology from Thales and its LUNA HSM, which has set the standard for advanced and secure encryption for many years. Cloud2’s XKS solution is fully managed and offers many of the same benefits as Cloud2’s other managed services.

Enables Key Store outside AWS

With AWS XKS solution, customers are able to control their own encryption keys outside AWS and manage access to their data, while still taking advantage of AWS’ advanced encryption and security features. The process works by allowing customers to create their own encryption keys in their own Hardware Security Module (HSM), which is approved by AWS. Then, the customers can register their HSM in AWS KMS and use their own keys to encrypt their data in AWS services such as S3, RDS, and EBS. One of the major benefits of the XKS service is that it gives customers the ability to maintain full control over their keys, even when they are stored in AWS. This means that customers can choose to move the keys to another HSM or even take them out of AWS completely, if necessary. XKS also provides advanced security features like multi-factor authentication and audit logging to ensure that only authorized individuals have access to the keys. This helps customers maintain compliance with data protection and security regulations. With Cloud2’s XKS solution, customers can be sure that their data is protected in the best possible way and meets the high security standards set by both Danish and EU law. For more information on XKS, and Cloud2’s managed services, please visit the following links: XKS link #block-yui_3_17_2_1_1728391364825_4855 {–sqs-block-content-flex: 0; } Cloud2 Managed Services #block-yui_3_17_2_1_1728391364825_4520 {–sqs-block-content-flex: 0; }

Cloud2

Cloud2

Field Notes

Related Articles

Continue exploring cloud technology and best practices

"Hold your own key" as a Service

Security

3 min read

Alert fatigue in SOCs: Why fewer alerts lead to better security

Alert fatigue is rarely caused by analysts. It is caused by how the SOC is designed. Effective security operations are built on fewer, better alerts.

Read more
"Hold your own key" as a Service

Cloud

8 min read

Digital Sovereignty by Design: Protecting the Agility That Makes Cloud Valuable

Sovereignty by design means building the controls that let you use the cloud on your terms – keeping access, agility, and innovation while meeting every regulatory and business requirement.

Read more
"Hold your own key" as a Service

Security

5 min read

The modern SOC: Rethinking security operations in a cloud-first world

Traditional SOC models struggle to keep pace with cloud, identity, and distributed work. Modern SOCs are about clarity of thinking, not scale of analysts.

Read more

Services

Related Services

Explore Cloud2 services related to this topic

Ready to discuss your cloud strategy?

Let's talk about how Cloud2 can help your organization.

Field Notes

Stay ahead of the cloud

Practical insights on AWS, Azure, security and AI. Delivered to your inbox.

No spam. Unsubscribe any time.