CPC H04L 9/0891 (2013.01) [H04L 9/0819 (2013.01)] | 20 Claims |
1. A method comprising:
storing, by an encryption system, a first key policy in association with a first key and a second key policy in association with a second key;
determining a remote machine stores a first application affected by the first key policy and a second application affected by the second key policy, the first application utilizing the first key to encrypt first data, and the second application utilizing the second key to encrypt second data;
determining the first key of the first application is non-compliant with the first key policy;
in response to the determining that the first key of the first application is non-compliant with the first key policy, sending a request to deploy a third key;
determining that the second key of the second application is non-compliant with the second key policy;
identifying an exception corresponding to the second key policy associated with an owner identifier of the second key and digital signature for verified contents of the second key;
in response to the second application being non-compliant, suppressing a second request to update the second key based on the exception associated with the owner identifier and the digital signature;
receiving a first response at the encryption system, the first response including a result of the request to deploy the third key and a suppression of the second request.
|