LOG-11: Are key lifecycle management events logged and monitored to enable auditing
and reporting on cryptographic keys' usage?
Logging of key lifecycle events should include but are not limited to the following events: key generation, key usage, key storage (including backup), and archiving and key deletion. In addition, only authorized personnel should have access to key materials, and all access attempts should be logged and reviewed.
Document and implement all key-management processes and procedures for cryptographic keys, including: a. Generation of strong cryptographic keys b. Secure cryptographic key distribution c. Secure cryptographic key storage d. Key revocation after expiry e. Split knowledge and dual control as needed for manual key management operations f. Prevention of unauthorized substitution of cryptographic keys
Control implemented
Control ownership
Description
Log and monitor key lifecycle management events to enable auditing
and reporting on usage of cryptographic keys.