Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

Version 1 Current »

One primary consideration is the Patriot Act, which theoretically allows the US government to access data from companies like Google, AWS, and Microsoft, even if stored in the EU. While policies make this challenging, there's still a possibility. That's where extra encryption comes in, offering you more control over your data's safety. By managing your encryption keys, you decide where they're stored and who has access. This boosts security and helps meet industry regulations, ensuring your data remains yours and yours alone. Let's explore why extending default encryption is smart for your digital security.

"To trust cloud computing, you need the ability to trust it less."

Patriot act

In theory, the US government could use the Patriot Act to compel companies like Google, AWS & Microsoft to hand over EU client data, even if that data is stored in the EU. Although policies, procedures, and standards make it difficult for the US government to compel any of these companies to hand over EU client data, it is essential to note that the Patriot Act opens the possibility that the US government could overcome cloud provider defenses if it were determined to do so.

Full control (Sovereignty)

Extra encryption gives clients more control over the encryption keys. For example, you can store your keys on-premises or in a cloud-based critical management service. You can also choose to rotate your keys more frequently, or you can store your keys in a different location than Google. Keys can be stored in a place only authorized people can access. Turning off the key immediately makes all data inaccessible.

Enhanced security

Hackers will have no immediate access to the encryption keys if an access or data breach occurs on the Google infrastructure. Furthermore, access to encryption keys can be quickly revoked, which makes all data inaccessible. In the worst case, keys could be destroyed, making all encrypted data inaccessible forever ("kill switch").

Audit

Extra encryption helps to audit who has accessed your data and when. This can help you detect any unauthorized access to your data.

Compliance

Meet industry regulations by retaining ownership and self-control of encryption keys. By managing your encryption keys, extra encryption can help clients comply with these requirements.

Key Secrecy

Clients can have greater control over encryption keys, allowing them to manage key rotation, access, and revocation independently of Google.

  • No labels