Browse
Core Concepts
Reasoning
Memory & Retrieval
Agent Types
Design Patterns
Training & Alignment
Frameworks
Tools
Safety
Meta
Browse
Core Concepts
Reasoning
Memory & Retrieval
Agent Types
Design Patterns
Training & Alignment
Frameworks
Tools
Safety
Meta
Customer Managed Keys (CMK) is a cryptographic security control that enables organizations to manage encryption keys through their own cloud Key Management Service (KMS) rather than depending on provider-managed default encryption. CMK ensures that the root of trust remains within the customer's cloud account, providing direct control over key lifecycle, access permissions, and cryptographic operations with full auditability through cloud provider audit logs 1)
CMK represents a fundamental shift in encryption key management strategy from delegated provider control to customer-directed governance. Under traditional provider-managed encryption, cloud service providers maintain responsibility for key generation, storage, rotation, and access control. CMK inverts this model, placing encryption key management responsibilities directly under customer control while the cloud provider supplies the underlying KMS infrastructure 2). Provider-managed defaults deliver standard encryption but require customers to trust the cloud provider with key management, whereas CMK enables highly regulated organizations to maintain encryption key sovereignty in their own cloud KMS accounts 3).
The implementation of CMK maintains clear cryptographic boundaries: the cloud provider stores encrypted data and performs authorized cryptographic operations, but cannot access plaintext encryption keys. The customer retains the master key material in their own KMS, controlling precisely which identities and services can request decryption operations. This architectural separation enables compliance with regulations requiring customer control over encryption key material, such as HIPAA, PCI-DSS, and industry-specific data residency requirements.
CMK implementations typically follow a two-tier key hierarchy. The customer's master key resides in their cloud provider's KMS, where it remains encrypted at rest and is never transmitted outside the HSM (Hardware Security Module) or equivalent trusted execution environment. When data encryption occurs, the KMS derives data encryption keys (DEKs) using the customer's CMK, and these derived keys encrypt the actual data. This hierarchy enables secure key rotation without requiring access to all encrypted data—only the CMK needs rotation, while previously derived keys remain valid until explicitly removed.
Cryptographic operations proceed through defined audit trails. When an authorized service requests decryption, the KMS logs the requestor, timestamp, and authorization context before executing the cryptographic operation 4). Customers can configure key policies to enforce multi-factor authentication requirements, restrict operations to specific time windows, or require dual control for sensitive operations. Integration with cloud provider CloudTrail, CloudWatch, or equivalent logging systems enables comprehensive audit compliance.
Organizations implementing CMK address multiple compliance and governance requirements. Financial services firms handling regulated data benefit from exclusive key control, satisfying auditor requirements that sensitive data encryption keys remain under customer governance. Healthcare organizations processing HIPAA-protected information leverage CMK to maintain required data access controls. Multi-tenant SaaS providers use CMK to demonstrate to enterprise customers that tenant data remains cryptographically isolated and inaccessible to platform operators without explicit key grant.
CMK also addresses vendor lock-in concerns by enabling key portability. If an organization migrates from one cloud provider to another, customer-managed keys can be exported and re-imported, providing data portability guarantees unavailable with provider-managed encryption.
CMK adoption requires careful operational planning. Key deletion represents an irreversible operation—if a CMK is permanently deleted, all data encrypted with derived keys becomes unrecoverable. Most cloud KMS services implement scheduled deletion windows (typically 30 days) allowing key recovery before permanent removal, but this demands disciplined key lifecycle management processes.
Key rotation introduces operational complexity. While automatic rotation of CMK is possible, organizations must monitor derived key validity periods and plan rotation schedules that balance security requirements against application restart needs. Incorrect rotation policies may cause key version proliferation, increasing operational overhead and audit complexity.
Performance impacts arise when high-throughput applications request decryption operations across distributed infrastructure. Although KMS services handle thousands of operations per second, latency-sensitive applications may experience degraded performance compared to local encryption with embedded keys. Network dependencies on the cloud KMS service create potential availability vulnerabilities if KMS becomes unreachable.