CEK-07: Is a cryptography, encryption, and key management risk program established
and maintained that includes risk assessment, risk treatment, risk context, monitoring,
and feedback provisions?
Key risk management is the process of managing the risks to key management governance, organization, infrastructure, and activities. a. Assess the risks of unauthorized disclosure, modification, destruction, or information loss. b. Cryptoperiod selections should consider the risk and consequences of information exposure. c. Evaluate the tradeoffs of manual versus automated key distribution. d. Reduce compromised key risks by (1) not using such keys for new encryption activities and (2) only using keys to decrypt material previously decrypted under this key. e. Adjust the audit scope and frequency to align with the risk assessment. f. Apply algorithm strength in proportion to the risk of information exposure. g. Assess risks to operational continuity versus the risks of key material data exposure when considering key recovery.
Control implemented
Control ownership
Description
Establish and maintain an encryption and key management risk program
that includes provisions for risk assessment, risk treatment, risk context,
monitoring, and feedback.