However, allowing a single user to have authorization to unilaterally perform operations on the cryptographic items stored at the key management system may compromise the security of the cryptographic items. For example, a malicious administrator having the required authorization may delete cryptographic items stored at the key management system. Thus, if another user of an application seeks to perform an operation with a cryptographic item that the malicious administrator has deleted, then the key management system would not be able to perform the operation as the cryptographic item has been deleted. In another example, an administrator system may be compromised by malicious software (e.g., malware) that may utilize the authorization of the administrator system to export cryptographic keys stored at the key management system. As a result, a malicious entity may receive the cryptographic keys that were intended to be secure and may thus compromise the security of other applications that use the cryptographic keys in other operations.