When encryption is used, the risk is transferred from the data itself to the cryptographic keys. The ability to securely manage, store, and use keys is essential. With a copy of the private key an attacker could decrypt data, create fraudle nt identities, and generate certificates at will.
Deploying a high-assurance crypto management platform is the best way to protect your cryptographic keys. This approach is build on a foundation of strong keys, enterprise key management, centralized crypto resource management, and the use of a hardware root of trust.