Policies and procedures on the use, protection, and lifetime of cryptographic keys should be developed and implemented through their full lifecycle.
Policies and procedures include but are not limited to the following considerations:
A. Policies and procedures relating to organization/management.
a. Roles and responsibilities (See GRM for general considerations)
b. Data protection (DSP domain for general considerations)
B. Policies and procedures relating to key management.
a. Key generation
b. Key distribution
c. Key rotation
d. Key revocation
e. Key destruction
f. Key activation
g. Key suspension
h. Key deactivation
i. Key archival
j. Key compromise
k. Key recovery
l. Key inventory management
m. Key purposes
n. Key access
Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Cryptography, Encryption and Key Management. Review and update the policies and procedures at least annually.
Policies and procedures on the use, protection, and lifetime of cryptographic keys should be developed and implemented through their full lifecycle.
Policies and procedures include but are not limited to the following considerations:
A. Policies and procedures relating to organization/management.
a. Roles and responsibilities (See GRM for general considerations)
b. Data protection (DSP domain for general considerations)
B. Policies and procedures relating to key management.
a. Key generation
b. Key distribution
c. Key rotation
d. Key revocation
e. Key destruction
f. Key activation
g. Key suspension
h. Key deactivation
i. Key archival
j. Key compromise
k. Key recovery
l. Key inventory management
m. Key purposes
n. Key access
Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Cryptography, Encryption and Key Management. Review and update the policies and procedures at least annually.