Gartner® says, "Data is moving across different cloud services and geographic locations, creating security and compliance risks. Security and risk management leaders should review how vendor products can help, because encryption key management products from cloud service providers do not mitigate all risks."
This Gartner research assesses the current KMaaS options to help organizations make decisions that support data security, compliance, and privacy strategy and operational benefits through strong data security governance.
Gartner Report: How to Improve Data Security With Cloud Key Management, Brian Lowans, Sarah Almond, 7 August 2024
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Automate key lifecycle management, reducing operational burden and improving efficiency.
Simplify key management and reduce operational costs associated with managing keys across multiple environments.
Robust and consistent security features protect sensitive data, including secure key storage and access control across cloud and SaaS environments
Aligns to compliance efforts by offering tools for data discovery and classification, and reporting
Gain more control over your data and operations within the cloud to achieve digital sovereignty
Across Clouds:
Any combination of public clouds and private or on-prem data infrastructure.
Across Key Sources:
CipherTrust Manager (CM), Luna Network HSM, DSM, Native
Across Key Management Ownership Models:
BYOK, HYOK, Native
Automate key lifecycle management across clouds and hybrid environments with processes and tools.
Processes include:
Key lifecycle management, Data protection
Tools include:
Amazon Web Services (AWS) KMS | Native | BYOK | |
AWS CloudHSM | Native | ||
AWS XKS | HYOK | ||
AWS China | Native | BYOK | |
AWS GovCloud | Native | BYOK | HYOK |
Google Cloud Platform CMEK | Native | BYOK | |
Google Cloud Platform EKM | HYOK | ||
Google Cloud Platform EKM UDE | HYOK-CC* | ||
Google Workspace CSE | HYOK | ||
Microsoft Azure Cloud | Native | BYOK | |
Microsoft Azure China | Native | BYOK | |
Microsoft Azure GovCloud | Native | BYOK | |
Microsoft Azure Managed HSMs | Native | BYOK | |
Microsoft 365 | BYOK | HYOK | |
Oracle Cloud Infrastructure | Native | BYOK | HYOK |
Salesforce.com | Native | BYOK | HYOK** |
Salesforce GovCloud Plus | Native | BYOK | HYOK** |
Salesforce Sandbox | Native | BYOK | HYOK** |
SAP Data Custodian | Native | BYOK |
*HYOK-CC is HYOK for Confidential Computing
**Cache-only Key Service