{"id":30985,"date":"2019-04-02T09:00:50","date_gmt":"2019-04-02T15:00:50","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=30985"},"modified":"2024-08-14T17:19:27","modified_gmt":"2024-08-14T21:19:27","slug":"key-escrow","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/key-escrow","title":{"rendered":"What is Key Escrow? – Store Cryptographic Keys – JumpCloud"},"content":{"rendered":"\n
Key escrow is a method of storing important cryptographic keys. Each key stored in an escrow system is tied to the original user and subsequently encrypted for security purposes. Much like a valet or coat check, each key is stored in relation to the user that leverages it, and then returned once queried. By using key escrow, organizations can ensure that in the case of catastrophe, be it a security breach, lost or forgotten keys, natural disaster, or otherwise, their critical keys are safe.<\/span><\/p>\n\n\n\n Compromised security keys are a certain death knell for IT organizations, <\/span>regardless of their size or industry<\/span><\/a>. Unfortunately, manually managing cryptographic keys is not an ideal way to keep such a critical resource secure. Oftentimes, an end user may keep security keys in easily accessible files on their machine, or inadvertently in an unsecured document on the public network. In the event of a breach, the resources tied to these keys will certainly be the first to be compromised.<\/span><\/p>\n\n\n\n With key escrow, these vital security keys are kept secure via additional encryption, and can only be accessed by the user that needs them, limiting the amount of contact from <\/span>non-trusted users<\/span><\/a>. Additionally, some compliance and law enforcement regulations require some sort of key escrowing so that, if necessary, escrowed keys can be accessed for official purposes. <\/span><\/p>\n\n\n\n While it may not be used very widely across a given organization, the occasions for key escrow are certainly significant.<\/span><\/p>\n\n\n\n IT organizations can use key escrow in several scenarios. One might consider public <\/span>SSH key management<\/span><\/a> a form of key escrow. When a user needs an SSH key pair to access their cloud infrastructure (i.e. AWS<\/span>\u00ae<\/sup><\/span>), a public and private key are generated. The private key is kept by the service the user authenticates to using their public key. <\/span><\/p>\n\n\n\n Since SSH keys are generally longer and more complex than traditional passwords, they are often harder to remember as a result. So, by using a key escrow system for the system-stored public keys, IT organizations can worry less about their users losing their SSH key pairs, and subsequently, their access to critical, protected resources.<\/span><\/p>\n\n\n\n Another important time to use key escrow is when using <\/span>full disk encryption (FDE)<\/span><\/a>. When a system\u2019s hard drive is encrypted using FDE, it is locked down at rest, and can only be unlocked in one of two ways. The first way, of course, is directly logging into the system with an authorized user\u2019s credentials. The other method is by using the recovery key: a unique, complex password that is tied directly to the encrypted disk.<\/span><\/p>\n\n\n\n Much like with public SSH keys, key escrow alleviates the burden of securely managing FDE recovery keys from both end users and IT admins. Unlike manually managing keys, however, key escrow is usually carried out by a third party service. So, how can you enable key escrow for your organization?<\/span><\/p>\n\n\n\n Several vendors focus solely on delivering key escrowing services. These solutions provide standard key escrowing, although the keys are not directly tied to their source (i.e. cloud infrastructure for SSH keys, systems for FDE). Some (although certainly not all) solutions (i.e. <\/span>FDE tools for Bitlocker or FileVault<\/span><\/a>) include key escrowing in their core delivery, escrowing solely the security keys the solution itself creates. Savvy IT admins, however, are looking at the problem of key escrow more holistically.<\/span><\/p>\n\n\n\n At its core, the concept behind key escrow is identity and access management (IAM). Said differently, securely managing user identities and resource access is the main reason organizations need key escrow. Historically, the main driver of IAM in any IT organization is the directory service. Since key escrow and IAM are so closely intertwined, wouldn\u2019t it seem right to have a directory service with key escrow built right in?<\/span><\/p>\n\n\n\n JumpCloud\u00ae<\/sup> Directory-as-a-Service\u00ae<\/sup><\/span><\/a> is the world\u2019s first cloud directory service and has reimagined IAM for the modern era. As a part of its centralized, all-in-one IAM offering, Directory-as-a-Service (DaaS) gives admins the ability to securely escrow their org\u2019s <\/span>public SSH keys<\/span><\/a> and <\/span>FDE recovery keys<\/span><\/a> in tandem and relation to the identities of the users that leverage them. This means that, using JumpCloud Policies, DaaS admins can also <\/span>enforce FDE across entire system fleets<\/span><\/a>, as well as manage SSH keys for AWS or other cloud infrastructure solutions.<\/span><\/p>\n\n\n\n These key escrowing features are only a small part of the big picture of the IAM capabilities of DaaS. JumpCloud grants user access to virtually all IT resources they leverage, starting at the system level and federating out to applications, file servers, networks, and more. What\u2019s more, the DaaS platform does so regardless of those users\u2019 choice of platform, protocol, or provider, no matter where they choose to work (on-prem or remote).<\/span><\/p>\n\n\n\n If such a directory service seems interesting to you, why not <\/span>try JumpCloud<\/span><\/a> for yourself? We realize that no two organizations are the same, so we give you the option to see how Directory-as-a-Service will work for yours with ten free users in the platform, <\/span>forever<\/span><\/i>. After you give it a try, you can scale JumpCloud to your organization with our affordable <\/span>pricing<\/span><\/a>. If you have any questions, or would like to learn more about key escrow and DaaS, <\/span>write us a note or give us a call today<\/span><\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":" Key escrow is a method of storing important cryptographic keys. Each key stored in an escrow system is tied to the original user.<\/p>\n","protected":false},"author":70,"featured_media":30986,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781],"tags":[],"collection":[2779],"platform":[],"funnel_stage":[3016],"coauthors":[2515],"acf":[],"yoast_head":"\nWhy is Key Escrow Important?<\/span><\/h2>\n\n\n\n
When Do You Use Key Escrow?<\/span><\/h2>\n\n\n\n
Public SSH Keys<\/span><\/h3>\n\n\n\n
Full Disk Encryption<\/span><\/h3>\n\n\n\n
How to Leverage Key Escrow<\/span><\/h2>\n\n\n\n
Key Escrow and IAM from the Cloud<\/span><\/h2>\n\n\n\n