Employ data security governance principles by focusing on sensitive data protection and privacy , conducting , deleting unnecessary data, and consolidating data silos, whether they are on-premises or in the cloud, to ensure project alignment with business objectives.
Focus on establishing the operational configurationof an EKM deployment that address access, backup, long-term storage and crypto-agilibilty, and start with default vendor settings rather than initially focusing on the "bits and bytes" settings business objectives.
Minimize the number of encryption vendors, where possible, to simplify key management operations by leveraging multiple products from a single vendor that can be applied to multiple data protection use cases business objectives.
Develop a formalized EKM process that is applicable to all data protection use cases to simplify operations, minimize cost of ownership and reduce the overall risks to data security and privacy.
* Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Gartner, Develop an Enterprisewide Encryption Key Management Strategy or Lose the Data, David Mahdi, Brian Lowans, 29 September 2020