Refer to NIST 800-57 for best practices of key management. Our intent is to keep the right level of technical depth that will help readers get a good understanding of the various key options. This blog expands on each key offering, highlights unique aspects, differences, benefits, challenges, typical use cases, and a high-level architectural overview of each key type.
![microsoft dynamics rms database schema microsoft dynamics rms database schema](https://pbs.twimg.com/media/DXIRSbgWsAAX7h3.jpg)
While it could be a daunting task to understand various encryption key types and their applications in the context of the environment, we will describe the various Microsoft Information Protection (MIP) encryption key types through this blog. Microsoft offers a variety of encryption keys that support various customer scenarios. MIP provides a unified set of capabilities to know your data, protect your data, and help prevent data loss across Microsoft 365 apps (e.g., Word, PowerPoint, Excel, Outlook) and services (e.g., Teams, SharePoint, and Exchange). Microsoft Information Protection (MIP) is a built-in, intelligent, unified, and extensible solution to protect sensitive data across your enterprise – in Microsoft 365 cloud services, on-premises, third-party SaaS applications, and more.
![microsoft dynamics rms database schema microsoft dynamics rms database schema](https://docs.microsoft.com/sv-se/dynamicsax-2012/appuser-itpro/images/dn463983.retailonlinestorechannelpublishflow(en-us,ax.60).jpg)
Enterprises are also heterogenous - one size does not fit all since they all have different business needs.
![microsoft dynamics rms database schema microsoft dynamics rms database schema](https://www.researchgate.net/profile/Xingyu-Ren/publication/341198468/figure/fig5/AS:891335733157897@1589522407167/Flame-centerline-temperatures-at-different-heights-a-mean-rms-and-ratio-of-rms-and.jpg)
Due to the nature of business and to meet regulatory requirements, sensitive data should always be securely stored and protected with solutions including strong data encryption. “Microsoft Managed Key (MMK), Bring Your Own Key (BYOK), Hold Your Own Key (HYOK), and Double Key Encryption (DKE)”Įnterprises often create, share, and store sensitive data on-premises, in the cloud, and across multiple clouds.