How are the encryption keys that are used managed and by whom? How well are encryption keys managed? Are encryption keys changed from default at installation, and changed anytime anyone with knowledge of the keys leaves your organization or changes positions? Are encryption keys secured? Can you use your own encryption keys in the cloud? Defining, designing, creating, and implementing a process to solve a challenge or meet an objective...