{"id":27190,"date":"2017-01-18T10:57:51","date_gmt":"2017-01-18T10:57:51","guid":{"rendered":"http:\/\/www.cloudcomputing-news.net\/news\/2017\/jan\/18\/google-launches-cloud-based-key-management-new-service\/"},"modified":"2017-01-18T10:57:51","modified_gmt":"2017-01-18T10:57:51","slug":"google-launches-cloud-based-key-management-with-new-service","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/google-launches-cloud-based-key-management-with-new-service\/","title":{"rendered":"Google launches cloud-based key management with new service"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.cloudcomputing-news.net\/media\/img\/news\/iStock_google1423_7bpV2nK.jpg\"><\/p>\n<p><em>(c)iStock.com\/tarik kizilkiya<\/em><\/p>\n<p>Google has announced the launch of Cloud Key Management Service (KMS), which enables admins to manage their encryption keys in Google Cloud Platform without maintaining an on-premise management system.<\/p>\n<p>The news marks Google&rsquo;s entry into this particular security arena, following Amazon Web Services (AWS) and Microsoft who launched such initiatives as far back as 2014 and 2015 respectively.<\/p>\n<p>&ldquo;Customers in regulated industries, such as financial services and healthcare, value hosted key management services for the ease of use and peace of mind that they provide,&rdquo; wrote Maya Kaczorowski, Google Cloud Platform product manager in a blog post. &ldquo;Cloud KMS offers a cloud-based root of trust that you can monitor and audit.<\/p>\n<p>&ldquo;As an alternative to custom-built or ad-hoc key management systems, which are difficult to scale and maintain, Cloud KMS makes it easy to keep your keys safe,&rdquo; Kaczorowski added.<\/p>\n<p>Alongside this, the company has published a whitepaper which doubles down on its security efforts and details &lsquo;how security is designed into [Google&rsquo;s] infrastructure from the ground up&rsquo;, in the words of Google Security distinguished engineer Niels Provos.<\/p>\n<p>The paper, which can be <a href=\"https:\/\/cloud.google.com\/security\/security-design\/\">read here<\/a>, explains how the security of Google&rsquo;s infrastructure is designed in progressive layers, from the data centre, to the hardware and software which underpins the infrastructure, and the processes put in place to support operational security.<\/p>\n<p>&ldquo;Google Cloud&rsquo;s global infrastructure provides security through the entire information processing lifecycle,&rdquo; wrote Provos. &ldquo;This infrastructure provides secure deployment of services, secure storage of data with end-user privacy safeguards, secure communications between services, secure and private communication with customers over the internet and safe operation by administrators.&rdquo;<\/p>\n<p>Regarding the KMS service, Leonard Austin, CTO at Google customer Ravelin, notes the cloud firm is &ldquo;transparent about how it does its encryption by default&hellip;and Cloud KMS makes it easy to implement best practices.&rdquo;<\/p>\n<p>You can read more about KMS <a href=\"https:\/\/cloudplatform.googleblog.com\/2017\/01\/managing-encryption-keys-in-the-cloud-introducing-Google-Cloud-Key-Management-Service.html\">here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>(c)iStock.com\/tarik kizilkiya<br \/>\nGoogle has announced the launch of Cloud Key Management Service (KMS), which enables admins to manage their encryption keys in Google Cloud Platform without maintaining an on-premise management system.<br \/>\nThe news marks Googl&#8230;<\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-27190","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/27190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=27190"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/27190\/revisions"}],"predecessor-version":[{"id":27191,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/27190\/revisions\/27191"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=27190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=27190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=27190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}