Skip to content

Zeroization

Secret keys and plaintexts are considered highly sensitive information and to securely erase from memory or storage Cosmian KMS implements data zeroization. The term zeroization originates from the process of setting all relevant bits to zero, effectively rendering the data unreadable and unrecoverable. This practice is essential to prevent unwanted memory residue of critical data, especially in scenarios where the confidentiality and integrity of data are paramount.

This is particularly crucial in environments where multiple users or processes access the same resources, but this does not prevent in any way an attacker reading from live memory as the latter may not be encrypted.

It is good to notice that in the source code, only keys and plaintexts represented as byte arrays are being zeroized using the zeroize crate. Regarding OpenSSL PKey types, they are being zeroized by OpenSSL itself, which is triggered on drop by Rust.

EVP_PKEYs are dropped with EVP_PKEY_free, which should use the appropriate cipher-internal freeing function, which in turn should cleanse all private data unless there is a bug in the underlying OpenSSL library […]. source

Regulatory Compliance

Cosmian KMS thus adheres to relevant industry standards and regulatory requirements concerning data security and privacy such as the Rust guidelines from ANSSI. The use of zeroization aligns with this standard, demonstrating our commitment to safeguarding sensitive information and meeting the necessary compliance obligations.

© Copyright 2018-2024 Cosmian. All rights reserved.