When I ask people what a customer managed keys architecture looks like, the responses I get are all over the place. It just isn’t well understood or standardized.
So let's clear the air a little with a survey of approaches and a discussion of what they have in common and what’s different. Take a look at our breakdown in our recent blog, The Customer Managed Keys Buyer's Guide.
The infographic below is from that guide and illustrates how variations of CMK are helping a number of companies win in their respective markets. A few of these claim CMK but miss the mark by quite a bit, but they still make for good case studies on what not to do.
Thank you to everyone who has been a part of the Architecting Privacy newsletter community this past year. I really appreciate each and every one of you, your feedback, suggestions, and your shared desire to make the world a better place through improved data privacy and control.
Every day our team hears from companies that badly want solutions to help them with the ethical, regulatory, and risk management problems they’re confronted with as they operate across digital ecosystems. We’re committed to helping these companies and to helping you.
(For obvious reasons, our team hasn’t met in person since this photo was taken back in February.)
We are committed to bringing data privacy to everyone—to businesses and through them to the customers they serve. Our goal is to bring better privacy to everyone.
A new year won't magically make all our problems go away. It's a good time to reflect, however, and consider what matters. If data privacy is as important to you as it is to us, we hope we can be a part of helping you make that a place where you improve in 2021.
I wish you all very happy and healthy holidays and a bright new year!
Until next year.