Page 449 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 449

secure manner. After all, it’s just as important as your primary key file!

               Hardware security modules (HSMs) also provide an effective way to
               manage encryption keys. These hardware devices store and manage

               encryption keys in a secure manner that prevents humans from ever
               needing to work directly with the keys. HSMs range in scope and
               complexity from very simple devices, such as the YubiKey, that store
               encrypted keys on a USB drive for personal use to more complex
               enterprise products that reside in a data center. Cloud providers, such

               as Amazon and Microsoft, also offer cloud-based HSMs that provide
               secure key management for IaaS services.
   444   445   446   447   448   449   450   451   452   453   454