Depending on criticity, use (frequency and effective use), consider:<p>* HSM <a href="https://en.wikipedia.org/wiki/Hardware_security_module" rel="nofollow">https://en.wikipedia.org/wiki/Hardware_security_module</a><p>* Handwritten base64 sheets of paper in different vaults<p>* a USB token (Yubikey, or whatnot)