{"id":202,"date":"2020-02-26T06:11:57","date_gmt":"2020-02-26T06:11:57","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=202"},"modified":"2020-02-26T06:11:57","modified_gmt":"2020-02-26T06:11:57","slug":"the-rising-danger-to-data-is-making-kmip-important","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/the-rising-danger-to-data-is-making-kmip-important\/","title":{"rendered":"The rising danger to data is making KMIP important"},"content":{"rendered":"\n<p>The need to protect data at rest is expanding the use of encryption  for storage systems, and the movement of data to the cloud is pointing  up the need for a standardized way to manage encryption keys across  diverse infrastructures. The <strong>Key Management Interoperability Protoco<\/strong>l is emerging as the  standard for this job, with vendors beginning to incorporate KMIP in  their products and customers making plans to use it. Cloud-based applications and storage are the primary drivers for its adoption. <\/p>\n\n\n\n<p> The only get-out-of-jail card you have is if the data is encrypted. <br> \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212; Richard Moulds, Thales eSecurity <\/p>\n\n\n\n<p>Cryptography is becoming a commodity. But while encryption  becomes easier, the essential job of managing the keys that encrypt and  decrypt data across an enterprise remains a challenge.<\/p>\n\n\n\n<p>Encryption 10 years ago was all about the Internet. Now it\u2019s all about data at rest, because that\u2019s where breaches are  exposing personal and other extensive data in wholesale volumes.  Government and industry regulations mandate encryption of this data, and  most states require disclosure of breaches that expose personally  identifiable information. \u201cThe only get-out-of-jail card you have is if  the data is encrypted. So the encryption of data at rest has taken off. <a href=\"https:\/\/gcn.com\/Articles\/2013\/06\/27\/Key-Management-Interoperability-Protocol-KMIP.aspx?Page=2\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed   solutions to automated, manage threat intelligence, forensic   investigations and cyber security training. Our objective is to support   organisations and consumers at every step of their cyber maturity   journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The need to protect data at rest is expanding the use of encryption for storage systems, and the movement of data to the cloud is pointing up the need for a standardized way to manage encryption keys across diverse infrastructures. The Key Management Interoperability Protocol is emerging as the standard for this job, with vendors &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/the-rising-danger-to-data-is-making-kmip-important\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The rising danger to data is making KMIP important&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[13,8],"tags":[],"class_list":["post-202","post","type-post","status-publish","format-standard","hentry","category-cryptography","category-encryption"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/202\/revisions"}],"predecessor-version":[{"id":203,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/202\/revisions\/203"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}