
Overview
OXVO uses centralized key management practices to control access to encryption keys and support secure key handling. Key rotation reduces long-term exposure risk and is an important control for security programs.
Controls & Practices
- Centralized key handling (implementation dependent) - Defined access controls for key usage - Rotation practices supported (plan/deployment dependent) - Recommended: separate duties for key administration where possible

More trust controls
Browse related security, privacy, and reliability controls across OXVO.
