A KMIP User Guide: How to Secure Applications for Today’s Cybersecurity Environment

Library Content Type:
Publish Date: 
Thursday, September 27, 2018
Event Name: 
Focus Areas:

The OASIS Key Management Interoperability Protocol (KMIP) standard may have its flaws, however its use continues to grow along with the need for encryption and it is the best approach available for strong data protection implementations across multiple devices.

If implemented too literally, KMIP can result in vulnerable, non-interoperable applications. This talk focuses on those vulnerabilities, and presents correct uses and workaround examples to help developers and integrators build secure applications and systems that work together.

Learning Objectives:
1. Learn how to implement KMIP in a way that maximizes interoperability
2. Use KMIP’s built-in extension mechanisms to improve security and performance
3. How to help make future versions of KMIP easier and safer to use