1.0 Introduction
Fortanix Key Insight discovers and maps keys to data services across on-premises and multi-cloud environments. It automatically discovers your encryption keys, maps them to data services, and assesses cryptographic security posture across on-premises and hybrid multi-cloud environments.
Fortanix Key Insight helps security and compliance teams assess and demonstrate whether their encryption keys are compliant with established policies and standards across the silos in the on-premises and multi-cloud environments. With this insight, organizations can quickly and easily implement large-scale corrective actions and improve their cryptographic security posture over time.
2.0 Key Discovery and Assessment
Fortanix Key Insight provides a unified view of all keys and data services or resources, including how they relate to all cloud and on-premises environments. Users get data-driven insights to quickly define the biggest data security risks and prioritize the remediation steps. Data security teams can easily identify key types and key utilization, assess service encryption status, and evaluate the organization's overall cryptographic security posture.
.png?sv=2022-11-02&spr=https&st=2025-04-03T07%3A07%3A45Z&se=2025-04-03T07%3A18%3A45Z&sr=c&sp=r&sig=Q%2BTygdq7eHInsix62MFizjJhuZeGSDLPNzVguafkTfA%3D)
Figure 1: Key Overview of a Cloud Connection (AWS)
.png?sv=2022-11-02&spr=https&st=2025-04-03T07%3A07%3A45Z&se=2025-04-03T07%3A18%3A45Z&sr=c&sp=r&sig=Q%2BTygdq7eHInsix62MFizjJhuZeGSDLPNzVguafkTfA%3D)
Figure 2: On-Premises Connection Overview
.png?sv=2022-11-02&spr=https&st=2025-04-03T07%3A07%3A45Z&se=2025-04-03T07%3A18%3A45Z&sr=c&sp=r&sig=Q%2BTygdq7eHInsix62MFizjJhuZeGSDLPNzVguafkTfA%3D)
Figure 3: Key Security Posture Assessment of a Cloud Connection
.png?sv=2022-11-02&spr=https&st=2025-04-03T07%3A07%3A45Z&se=2025-04-03T07%3A18%3A45Z&sr=c&sp=r&sig=Q%2BTygdq7eHInsix62MFizjJhuZeGSDLPNzVguafkTfA%3D)
Figure 4: On-Premises Connection Assessments
3.0 Policy Compliance and Violation
Fortanix Key Insight empowers customers to govern comprehensive key management policies, including key strengths, algorithms, and rotation protocols. Customers can immediately identify policy misalignments and provide insights into their potential impact through vulnerability messages. This approach enables proactive risk mitigation and improves the overall security posture.

Figure 5: Mapping of Keys to Services in a Cloud Connection