Organization Administration > Customer-managed encryption keys
  

Customer-managed encryption keys

You can use your own master key to encrypt your organization's encryption keys.
By default, Informatica Intelligent Cloud Services protects your organization's sensitive data in the cloud using organization-specific encryption keys that are generated and stored in the Informatica Intelligent Cloud Services key management service (KMS). To prevent malicious access, the keys are encrypted using a master key that is stored in the cloud provider's KMS.The master key is provisioned in Informatica's KMS account and varies by POD.
If you prefer, you can create a customer-managed key (CMK). When you create a CMK, you control access to it. However, you'll need to grant Informatica Intelligent Cloud Services access to the CMK so that it can encrypt and decrypt your organization's sensitive data.
Creating a CMK offers the following benefits:
The following image shows how Informatica Intelligent Cloud Services interfaces with your CMK:
Informatica Intelligent Cloud Services interfaces with its KMS agnostically. Non-customer managed keys go to Informatica's cloud KMS. Customer managed keys go to the customer's KMS, which can be Azure Key Vault, AWS KMS, or Google Cloud KMS.
  1. 1Informatica Intelligent Cloud Services interfaces with the Informatica Intelligent Cloud Services KMS agnostically.
  2. 2Non-customer managed keys go to Informatica's cloud KMS.
You can create and enable a CMK when you use the following cloud providers' key management services:
Note: When you create a CMK, your KMS and Informatica Intelligent Cloud Services POD must use the same cloud provider. For example, if your Informatica Intelligent Cloud Services POD is USW1 on AWS, then you must store your CMK on AWS KMS. You can't store it on Google Cloud KMS or Azure Key Vault.