CEK-15: Are processes, procedures, and technical measures to create keys in a pre-activated
state (i.e., when they have been generated but not authorized for use) being defined,
implemented, and evaluated to include legal and regulatory requirement provisions?
Activated keys are used to protect information cryptographically. a. Pre-activated keys are activated by entering the start date of the validity/cryptoperiod. b. Keys which are not activated for use are not ready to encrypt data. c. Non-activated keys should only be used to perform proof-of-possession or key confirmation. d. If pre-activated keys are no longer needed, they should be destroyed. e. If there are suspicions about the integrity of a given key, it should be moved to the compromised state. f.All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to create keys in a pre-activated state when they have been generated
but not authorized for use, which include provisions for legal and regulatory
requirements.