Key lifecycle management
While operating your workloads, you need to manage the lifecycle of your keys. The US National Information Standards Institute (NIST) special publication (SP) 800-57, Part 1 describes a key management lifecycle that is divided into four phases: pre-operational, operational, post-operational, and destroyed.
The following section provides a mapping of the NIST lifecycle functions from the publication to Google Cloud KMS lifecycle functions.
- The Pre-operational lifecycle phase is mapped to the following:
- NIST section 8.1.4 Keying-Material Installation Function: The equivalent Cloud KMS operation is Key import.
- NIST section 8.1.5 Key Establishment Function: The equivalent Cloud KMS operation is Key creation (symmetric, asymmetric).
- The Operational lifecycle phase is mapped to the following:
- NIST section 8.2.1 Normal Operational Storage Function: The equivalent Cloud KMS operation is Key creation in SOFTWARE, HSM, or EXTERNAL protection levels (symmetric...