SAMMY UI is optimized for resolutions with a width 1024px and higher.
Encryption and Key Management Audit
CEK-09: Are encryption and key management systems, policies, and processes audited with a frequency proportional to the system's risk exposure, and after any security event?
Key audit is the process of assessing the organization, governance, infrastructure, policies, procedures, and activities.
a. Audits assess compliance with "key management" policies and procedures.
b. Audits assess the design and effectiveness of "key management" controls and the control environment.
c. Audits assess compliance with industry and regulatory standards (e.g., Health Insurance Portability and Accountability Act (HIPAA), payment card industry (PCI)).
d. Audits results are reported to the key management system authority.
e. Audits are performed according to key- and risk-management policies.
f. Request third-party certification reports and review issues with the CSP and auditor.
g. At a minimum, sensitive audit information and sensitive audit tools should be cryptographically protected.
Control implemented
Control ownership
Description

Audit encryption and key management systems, policies, and processes with a frequency that is proportional to the risk exposure of the system with audit occurring preferably continuously but at least annually and after any security event(s).

Encryption and Key Management Audit
CEK-09: Are encryption and key management systems, policies, and processes audited (preferably continuously but at least annually)?
Key audit is the process of assessing the organization, governance, infrastructure, policies, procedures, and activities.
a. Audits assess compliance with "key management" policies and procedures.
b. Audits assess the design and effectiveness of "key management" controls and the control environment.
c. Audits assess compliance with industry and regulatory standards (e.g., Health Insurance Portability and Accountability Act (HIPAA), payment card industry (PCI)).
d. Audits results are reported to the key management system authority.
e. Audits are performed according to key- and risk-management policies.
f. Request third-party certification reports and review issues with the CSP and auditor.
g. At a minimum, sensitive audit information and sensitive audit tools should be cryptographically protected.
Control implemented
Control ownership
Description

Audit encryption and key management systems, policies, and processes with a frequency that is proportional to the risk exposure of the system with audit occurring preferably continuously but at least annually and after any security event(s).