New Blog Post | Understanding Microsoft Information Protection Encryption Key Types

%3CLINGO-SUB%20id%3D%22lingo-sub-2217603%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Understanding%20Microsoft%20Information%20Protection%20Encryption%20Key%20Types%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2217603%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1615998642850.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F264880i73F8EF792AF5F7F3%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1615998642850.png%22%20alt%3D%22JasonCohen1892_0-1615998642850.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_1-1615998654514.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F264881i40F4568C3913E75C%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_1-1615998654514.png%22%20alt%3D%22JasonCohen1892_1-1615998654514.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_2-1615998666558.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F264882i21EB0E7E817459DE%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_2-1615998666558.png%22%20alt%3D%22JasonCohen1892_2-1615998666558.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fmicrosoft-security-and%2Funderstanding-microsoft-information-protection-encryption-key%2Fba-p%2F2214589%22%20target%3D%22_blank%22%3EUnderstanding%20Microsoft%20Information%20Protection%20Encryption%20Key%20Types%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%20offers%20a%20variety%20of%20encryption%20keys%20that%20support%20various%20customer%20scenarios.%20While%20it%20could%20be%20a%20daunting%20task%20to%20understand%20various%20encryption%20key%20types%20and%20their%20applications%20in%20the%20context%20of%20the%20environment%2C%20we%20will%20describe%20the%20various%20Microsoft%20Information%20Protection%20(MIP)%20encryption%20key%20types%20through%20this%20blog.%20This%20blog%20expands%20on%20each%20key%20offering%2C%20highlights%20unique%20aspects%2C%20differences%2C%20benefits%2C%20challenges%2C%20typical%20use%20cases%2C%20and%20a%20high-level%20architectural%20overview%20of%20each%20key%20type.%20Our%20intent%20is%20to%20keep%20the%20right%20level%20of%20technical%20depth%20that%20will%20help%20readers%20get%20a%20good%20understanding%20of%20the%20various%20key%20options.%20Refer%20to%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fcsrc.nist.gov%2Fpublications%2Fsp800%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3ENIST%20800-57%3C%2FA%3E%3CSPAN%3E%26nbsp%3Bfor%20best%20practices%20of%20key%20management.%20The%20blog%20outlines%20key%20elements%20that%20enable%20encryption%2C%20discusses%20rights%20management%20services%2C%20various%20key%20types%20and%20concludes%20with%20a%20comparison%20tables%20that%20helps%20to%20choose%20the%20appropriate%20key%20types.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2217603%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1615998642850.png

JasonCohen1892_1-1615998654514.png

JasonCohen1892_2-1615998666558.png

Understanding Microsoft Information Protection Encryption Key Types - Microsoft Tech Community

Microsoft offers a variety of encryption keys that support various customer scenarios. While it could be a daunting task to understand various encryption key types and their applications in the context of the environment, we will describe the various Microsoft Information Protection (MIP) encryption key types through this blog. This blog expands on each key offering, highlights unique aspects, differences, benefits, challenges, typical use cases, and a high-level architectural overview of each key type. Our intent is to keep the right level of technical depth that will help readers get a good understanding of the various key options. Refer to NIST 800-57 for best practices of key management. The blog outlines key elements that enable encryption, discusses rights management services, various key types and concludes with a comparison tables that helps to choose the appropriate key types.

1 Reply
Thank you for sharing these valuable information.