Key management: generating, storing, rotating, and destroying cryptographic keys. Importance: keys are the security foundation; compromised keys = compromised data. Best practices: use HSMs or KMS (AWS KMS, Vault), rotate keys regularly, separate keys per environment, audit key access, secure key backup, define key lifecycle policies.