DuoKey logotype

Compliance

GDPR

Article 32 security, breach risk, and transfers, encryption that is meaningful because you hold the keys.

Talk to us

Requirements

What the regulation expects

GDPR names encryption and pseudonymisation as example measures (Art. 32). Regulators and DPAs care whether those measures are effective in practice. Provider-managed keys still leave the provider inside the critical path to plaintext. Customer-controlled keys move the boundary: your organisation (or a processor strictly on your instructions) operates key ceremony, access policies, and logging—so security measures align with accountability, DPIA outcomes, and breach-notification narratives.
What the regulation expects

Customer-controlled keys under GDPR

Art. 32 measures should be effective—not only “encrypted” labels in a vendor console.

Integrity and confidentiality of processing

You must protect personal data against unlawful processing, accident, and breach. Strong encryption reduces impact; controlling keys reduces who can bypass that protection.

Data transfers and supplementary measures

After Schrems II, technical supplementary measures often include encryption where keys are not available to non-adequate recipients. External key stores and split-key models support that story—subject to your legal analysis.

Breach notification and accountability

If data is encrypted with state-of-the-art algorithms and keys were not compromised, impact assessments change. Key custody under your SOC/ISO programme supports consistent documentation.

Solutions

Relevant DuoKey products

OpenBAO + DuoKey SD-HSM

Apply consistent access rules, auditing integrations, and approved cryptographic backends.

Learn more
AWS XKS & hybrid patterns

Prevent the US cloud operator from being the sole custodian of keys that protect personal datasets—per your legal strategy.

Learn more
Microsoft 365 Customer Key & DKE

Isolate the highest tiers with customer-held keys or double encryption where Microsoft never holds the outer key alone.

Learn more
Tokenisation

Issue and control tokens tied to your key material so re-identification stays gated.

Learn more

Key themes

Where customer-controlled keys fit

DuoKey helps controllers and processors move beyond checkbox encryption by putting key custody, access policies and audit trails under your organisation's governance — supporting effective Art. 32 measures and defensible breach narratives.

Art. 32(1)(a) — pseudonymisation and encryption

Pair field-level or volume encryption with key procedures you operate and audit—not only the cloud console the vendor gives you.

Art. 32 — restoring availability and access

Key backups, HSM clustering, and MPC quorum designs support resilience without giving up control.

Related links