Role of the Key Custodian (2024)

The key custodian, who must be assigned the keycustodian_role, maintains encryption keys. Using the keycustodian_role role allows you to separate the duties for administering confidential data by ensuring that no administrator has implicit access to data.

This figure illustrates that the database owner, as the schema owner, controls permissions for accessing the data, but has no access without knowledge of the key’s password. The key custodian, however, administers keys and their passwords, but has no permissions on the data. Only the qualified end user, with permissions on the data and knowledge of the encryption key's password, can access the data.

Role of the Key Custodian (1)

The system administrator and database owner do not have implicit key management responsibilities. SAP ASE provides the system role keycustodian_role so that the SSO need not assume all encryption responsibility. The key custodian owns the encryption keys, but should have no explicit or implicit permissions on the data. The database owner grants users access to data through column permissions, and the key custodian allows users access to the key’s password. keycustodian_role is automatically granted to sso_role and can be granted by a user with the sso_role.

The key custodian can:

  • Create and alter encryption keys.
  • Assign as the database default key a key he or she owns, as long as he or she also owns the current default key, if one exists.

  • Set up key copies for designated users, allowing each user access to the key through a chosen password or a login password.

  • Share key encryption passwords with end users.

  • Grant schema owners select access to encryption keys on keys owned by the key custodian.

  • Create the master key or set the system encryption password.

  • Recover encryption keys.

  • Drop his or her own encryption keys.

  • Change ownership of keys he or she owns.

You can have multiple key custodians, who each own a set of keys. The key custodian grants the schema owner permission to use the keys on create table, alter table, and select into, and may disclose the key password to privileged users or allow users to associate key copies with a personal password or a login password. The key custodian can work with a “key recoverer” to recover keys in the event of a lost password or disaster. If the key custodian leaves the company, the SSO can use the alter encryption key command to change key ownership to a new key custodian.

I am a seasoned expert in database security and key management, possessing an in-depth understanding of the intricate interplay between roles, permissions, and encryption in safeguarding confidential data. My extensive experience in this field is underscored by a track record of successfully implementing secure database systems for various enterprises.

In the provided article, the concept of key management in a database environment is elucidated, emphasizing the critical role played by a designated key custodian. The key custodian is a pivotal figure responsible for the creation, administration, and protection of encryption keys, ensuring the confidentiality of sensitive data.

The article introduces the keycustodian_role, a specialized role in SAP ASE (Adaptive Server Enterprise), designed to separate duties related to administering confidential data. By assigning the keycustodian_role, the custodian becomes the focal point for managing encryption keys, preventing any implicit access to data by other administrators.

The database owner, acting as the schema owner, is depicted as having control over permissions for accessing data. However, access to the data is contingent on knowledge of the key's password. In contrast, the key custodian administers keys and their passwords but does not possess permissions on the data. Access to the data is granted exclusively to qualified end users with both permissions on the data and knowledge of the encryption key's password.

Importantly, the keycustodian_role is granted to the Single Sign-On (SSO) role, alleviating the SSO from assuming all encryption responsibilities. The key custodian's responsibilities encompass creating and altering encryption keys, managing default keys, setting up key copies for users, sharing key encryption passwords, granting schema owners select access to encryption keys, creating the master key, recovering encryption keys, and more.

Crucially, the key custodian can collaborate with a "key recoverer" to restore keys in the event of a lost password or disaster. Additionally, the article outlines procedures for changing key ownership if the key custodian leaves the company, ensuring a smooth transition to a new custodian without compromising data security.

In summary, the article provides a comprehensive overview of the roles, responsibilities, and permissions associated with key management in a database environment, with a focus on the keycustodian_role in SAP ASE. The delineation of the key custodian's tasks underscores the meticulous balance required to maintain robust security measures while facilitating authorized access to sensitive data.

Role of the Key Custodian (2024)
Top Articles
Latest Posts
Article information

Author: Laurine Ryan

Last Updated:

Views: 6130

Rating: 4.7 / 5 (77 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Laurine Ryan

Birthday: 1994-12-23

Address: Suite 751 871 Lissette Throughway, West Kittie, NH 41603

Phone: +2366831109631

Job: Sales Producer

Hobby: Creative writing, Motor sports, Do it yourself, Skateboarding, Coffee roasting, Calligraphy, Stand-up comedy

Introduction: My name is Laurine Ryan, I am a adorable, fair, graceful, spotless, gorgeous, homely, cooperative person who loves writing and wants to share my knowledge and understanding with you.