Managing encryption keys and storing them securely is the cornerstone to meeting data security and sovereignty requirements. This is because encryption keys (also called cryptographic keys) are the strings of bits generated to encode and decode data. Whoever owns and manages the keys, therefore also ultimately owns the data. This is why organizations must prove they fully manage and control their encryption keys to be compliant.