keycentric
Keycentric is a term used to describe a design and security paradigm that places cryptographic keys at the center of a system’s security model. In a key-centric approach, the security architecture, policies, and operations are oriented around the creation, protection, lifecycle management, and controlled use of cryptographic keys. Data is typically encrypted with keys that themselves are protected by hardware-backed secure storage, and access to plaintext data depends on possessing valid keys or derived key material.
Core concepts include a hierarchical key structure (root or master keys, domain keys, and per-application or
Applications of key-centric security include cloud storage encryption, database encryption, email and communication encryption, and sensitive
Advantages of a key-centric approach include centralized control over data encryption keys, improved ability to enforce
Related terms include key management, envelope encryption, and cryptographic agility. The term is used in information