Download PDF version Contact company

Thales announced the launch of its CipherTrust Cloud Key Manager integration with the AWS External Key Store, a feature of the AWS Key Management Service announced at AWS re: Invent 2022. Following an increased call for enhanced sovereign controls amid growing regulatory requirements, the integration enables organisations to retain control of their encryption keys when migrating their sensitive data to the AWS cloud.

Developed with Thales since its inception, the AWS External Key Store combined with CipherTrust Cloud Key Manager offers organisations looking to move critical workloads to the cloud a way to maintain sovereign control of sensitive data throughout their digital transformation journey.

Hardware security modules and key management

We’ve had a strong technical collaboration with Thales on the development of the AWS External Key Store specification from the very beginning, in part due to their long history of expertise developing hardware security modules and key management services,” said Ken Beer, General Manager, Key Management Service at AWS. 

The cloud has become a critical point of operation across businesses, and our combined expertise provides a way of helping organisations address specific needs and know they’re getting industry-best security controls in the process.”

User-controlled encryption

Only about one-third (29%) of respondents report total control of their keys to encrypted data in the cloud

According to the Thales 2022 Cloud Security Study, encryption is the number one choice to protect data in the cloud. However, only about one-third (29%) of respondents report total control of their keys to encrypted data in the cloud.

User-controlled encryption and key management in hybrid IT are essential safeguards to enforce digital sovereignty in a modern data-driven world governed by privacy compliance mandates, regulated sectors, or general IT security recommendations such as the Shared Responsibility Model and the NIS2 Directive.

CipherTrust Cloud Key Manager

CipherTrust Cloud Key Manager ensures AWS External Key Store customers can satisfy these urgent regulatory requirements by leveraging strong encryption and data security methods that allow organisations to manage their data separately from the cloud service provider.

Such a safeguard, also known as Hold Your Own Key (HYOK), enables organisations to maintain key ownership separate from the cloud data store.

Cloud services

Varying data protection regulations across countries have presented a challenge for global organisations migrating to the cloud,” said Heleen Herselman, VP of AWS Powerhouse at T-Systems Cloud Service.

The CipherTrust Cloud Key Manager simplifies this challenge and ensures we remain compliant while taking advantage of all the benefits of leveraging cloud services. The ability to lean on Thales’ solution has become especially important, as we, and other organisations, increasingly rely on multi-cloud environments.”

Multi-cloud encryption key life cycle management solution

CipherTrust Cloud Key Manager supports all major public cloud service providers to centralise key management

CipherTrust Cloud Key Manager is a multi-cloud encryption key life cycle management solution that supports all major public cloud service providers. With a marked increase in multi-cloud adoption, this solution allows users to centralise key management across all clouds.

This is the first integration on the market to solve a major pain point for AWS cloud customers: how can they utilise protected data in the AWS cloud while retaining encryption keys outside the cloud,” said Todd Moore, VP of Encryption Products at Thales.

Advanced digital transformation

As an industry leader in key management solutions, we are proud to offer an encryption solution that provides the ability to maintain external control of keys and cryptographic operations using those keys. CipherTrust Cloud Key Manager is at the forefront of advanced digital sovereignty."

"We’ll continue introducing cutting-edge security and compliance features that support organisations in their digital transformation journeys.

Download PDF version Download PDF version

In case you missed it

What is the expanding role of audio in today's physical security systems?
What is the expanding role of audio in today's physical security systems?

Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

Climax releases an advanced smart telecare solution with voice control
Climax releases an advanced smart telecare solution with voice control

GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cove...

Quick poll
Which feature is most important in a video surveillance system?