Customer-Managed Keys (CMK)
Data ProtectionMedium Complexity📚 Medium
You control the encryption keys, not just the data
Decision Guide
✓
When to Use
- →HIPAA BAA requires customer-controlled encryption
- →Financial services regulations mandate key custody
- →Enterprise security policy requires BYOK (Bring Your Own Key)
- →Need the ability to 'crypto-shred' data by revoking keys
- →Government or defense contracts with strict key management requirements
✗
When NOT to Use
- →No regulatory requirement for key custody
- →Small team without dedicated security operations
Controls Using This Technology
The following 1 controls use Customer-Managed Keys (CMK) for implementation:
Need to Compare Options?
See how Customer-Managed Keys (CMK) compares to other access control approaches with our detailed comparison table.
Compare Technologies →