The following table provides an introduction to terminology related to keys that can help you understand Protegrity Key Management.
Term | Definition |
---|---|
Master Key (MK) | It is generated and stored in the Key Store. When the Key Management is initialized, the Key Store is switched or active key is rotated. MK protects all DEKs in the Policy repository. |
Repository Key (RK) | It is generated in the configured Key Store when the Key Management is initialized or active key is rotated. It is protected by MK. It protects the Policy Repository in ESA. |
Data Store Keys (DSK) | It is generated in the configured Key Store when a Data Store is created. It is protected by MK. It is only used to protect staging located on the ESA. |
Signing Key | It is generated in the configured Key Store when the ESA is installed and key management is initialized. It is protected by MK.It is used to sign the audits generated by protectors. It is used by the Protector to add a signature to the log records generated for each data protection operation, which are then sent from the Protector to the ESA.The Signing Key helps to identify that the log records have not been tampered with and are received from the required protection endpoint or Protector. |
Key Encryption Keys (KEK) | It protects other keys. In Protegrity Data Security Platform, the MK is the KEK. |
Data Encryption Keys (DEK) | It is used to protect data. In the Protegrity Data Security Platform, the RK, Signing Key, DSK, and Data Element Keys are the DEKs. |
Data Element Keys | It is generated when a data element is created. This key protects the sensitive data. |
Protegrity Soft HSM | It is internally housed in the ESA. It is used to generate keys and stores the Master key. |
Key Store - HSM or KMS | The Key Store can be a Hardware Security Module (HSM), or other supported Key Management Service (KMS) that can store keys and perform cryptographic operations. |
NIST 800-57 | NIST Special Publication 800-57 defines best practices and recommendations for the Key Management. |
FIPS 140-2 | Federal information process standard (FIPS) used to accredit cryptographic modules. |
PKCS#11 Interface | Standard API for Key Management. |
Key States | The state of a key during the key life cycle. |
Cryptoperiods | The time span during which a specific key is authorized for use or in which the keys for a given system or application may remain in effect. |
Originator Usage Period (OUP) | The period of time in the cryptoperiod of a symmetric key during which cryptographic protection may be applied to data |
Recipient Usage Period (RUP) | The period of time during the cryptoperiod of a symmetric key during which the protected information is processed. |
Endpoint | It is the protection endpoint. In most cases, it is the Protector. |
Policy Repository | Internal storage in ESA, which stores policy information including the Master key properties and all DEK properties. |