Keys should be stored in secure environments such as Hardware Security Modules (HSMs) or other encrypted storage solutions. It's important to ensure that keys are not stored in plaintext on any system. Access controls and audit logs should be implemented to monitor and restrict access to stored keys.