Zoom to Launch Customer Managed Key for Security Compliance

Zoom is launching Zoom Customer Managed Key (CMK), a new security offering designed to help customers address stricter compliance requirements.

CI Staff Leave a Comment

San Jose, Calif.-based videoconferencing giant Zoom is launching Zoom Customer Managed Key (CMK), a new security offering designed to help customers address stricter compliance requirements and give them the ability to protect certain data stored within Zoom Cloud using their own encryption keys.

According to Zoom, CMK is the company’s “newest advanced security offering.” The company says the paid offering and its Bring Your Own Key (BYOK) solution allows customers to use their own encryption keys to encrypt certain Zoom assets, including cloud recordings, voicemails, calendar access tokens and more.

List of Assets

The full list of assets covered by Zoom CMK includes:

  • Zoom Meeting cloud recordings (including transcripts and chat texts)
  • Calendar access tokens for Zoom Rooms
  • Zoom Webinars cloud recordings
  • User calendar access tokens
  • Zoom Phone voicemails and recordings
  • Microsoft Teams access tokens
  • Archiving for meetings and webinars

Additionally, the company says CMK is designed for industries with unique regulatory requirement — such as healthcare and finance — that must safeguard important information and remain compliant with those regulations.

Also Read: Zoom Announces Workspace Reservation Feature To Be Generally Available

Zoom says at launch, CMK will support customers who use AWS Key Management Service. Admins can provision encryption keys directly within the “Security” tab on the Zoom admin portal, and organizations can work with Zoom Global Services to implement CMK.

“We strive to provide the tools you need to navigate today’s complex regulatory landscape and tailor a security strategy to your organization’s unique needs,” the company said in a blog post. “CMK is designed to help you protect your data in the way your business needs. Whether you want to deploy CMK or one of our other security offerings, you have options — a choice in how you safeguard your information.”

This article originally appeared on our sister site, My TechDecisions.