In some embodiments, the requested operation may be associated with a group of entities assigned to the cryptographic data item. For example, the application may transmit a request to the key management system to modify the quorum policy associated with a group. Examples of modifications to the quorum policy may include changing the number of approvals required to perform an operation, changing the types of operations that require quorum approval, etc. In embodiments, the requested operation may be associated with the entities (e.g., entities 110a-n of