Episode 61 — Apply Key Management Right: Rotation, Storage, and Separation of Duties

This episode focuses on key management as a foundational control for AI systems, because SecAI+ scenarios often involve encrypted datasets, protected model artifacts, secure API calls, and secrets used by retrieval or agent tools, and weak key practices can erase the benefits of otherwise strong designs. You will learn how to store keys and secrets safely using centralized services rather than application configuration files, how to separate duties so no single person or service can both access sensitive data and control the keys that protect it, and why rotation policies must be engineered for uptime instead of treated as an occasional manual task. We will connect key decisions to practical impacts such as preventing unauthorized decryption of training corpora, controlling access to vector stores and logs, and limiting blast radius if a service account is compromised. You will also cover troubleshooting patterns like avoiding broken integrations during rotation, detecting keys that are over-shared across environments, and verifying that backups and replicas follow the same key protection standards as primary storage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 61 — Apply Key Management Right: Rotation, Storage, and Separation of Duties
Broadcast by