TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/tip/Key-management-challenges-and-best-practices

Key management challenges and best practices

By Randy Nash, Contributor

Data protection is driving financial services firms to implement various encryption products, including full-disk encryption (FDE) for notebook computers and either full- or partial-field encryption on databases. One thing that can't be overlooked is the need for proper key management.

More on encryption:
Laptop encryption options

Encryption methods for financial organizations

For the purposes of this article, key management refers to all procedures related to generation, exchange, storage, safeguarding, use and replacement of keys.

Key management challenges
The proper management of cryptographic keys is essential to the effective use of encryption products. Loss or corruption of these keys can lead to loss of access to systems and data, as well as making a system completely unusable unless it is reformatted and reinstalled.

Key management is a challenge that grows with the size and complexity of your environment. The larger your user base, the more diverse your environment, or the more distributed they are, the greater the challenge will be. Some of the bigger challenges involve:

User training and acceptance
End users are your first customer, and let's face it -- users don't like change. While not actually part of the key management process, user acceptance can be a huge impediment to the success of any project. It will be especially important if the user experience is changed in any way. Mitigate this problem as much as possible by researching the products in advance. Find out what the impact is to the users in the areas of application or system interface (logins), latency due to the encryption process, and difficulties in key recovery or resetting the users key or passwords. Run a pilot program with actual users as part of the project. Listen to their feedback and develop appropriate training to address their specific concerns or difficulties. Develop system bench marks for performance, both before and after the product is implemented. If it will now take 10 seconds more to complete a particular task, make sure the user knows this in advance. In other words, manage user expectations.

System administration, maintenance and key recovery
These issues are likely to have a huge impact on the organization and must be addressed to the vendor before you make your purchase:

Many vendors support a challenge/response procedure to allow remote password resets. In this scenario, a challenge code is generated by the system. The user then calls their administrator and tells them their user information and the challenge code. The administrator then generates a response code, which the user enters to reset their password.

In the end, know what you're buying and how it will impact your organization.

Best practices
Where do financial organizations who haven't dealt with key management issues turn for help? The specifics of cryptographic key management are largely handled behind the scenes by the cryptographic software modules, where the standards and best practices are well established. The National Institute of Standards and Technology (NIST) develop standards for government agencies, but these standards can be applied in any business community. NIST has provided a publication known as Special Publication (SP) 800-57, Recommendations for Key Management Part 1 (.pdf) and SP 800-57 Part 2 (.pdf). NIST has also developed overall encryption requirements, generally referred to as FIPS 140-2, Security Requirements for Cryptographic Modules (.pdf). This is generally a good starting point when discussing encryption products with your vendors.

In the meantime, here are a few industry best practices to get you started:

Products
There are a large number of products available, and this market space is growing rapidly. There has also been recent movement of large companies acquiring smaller companies and startups. Here are some of the key players:

Data encryption and FDE are not new technologies, but the product offerings are evolving rapidly in response to new challenges and regulatory requirements. Evaluate products carefully and know where they came from. Some well-known companies have bought some unknown products to fill this niche. Make sure the products have the maturity and depth of features to meet your organizational needs, as well as regulatory requirements.

About the author:
Randy Nash is CISSP with more than 25 years of professional experience in information security, system security, network security, personnel security, and physical security. First certified in ADP security and risk assessment in 1984, he has a long history of work with civilian, military and government entities. Randy also maintains the security website @RISK Online, where he regularly posts projects and articles on a wide variety of security topics.

24 Jul 2008

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement