CEK-17: Are processes, procedures, and technical measures to deactivate keys (at the
time of their expiration date) being defined, implemented, and evaluated to include
legal and regulatory requirement provisions?
Deactivated keys should not be used to encrypt but can be used to decrypt. a. Upon the expiration date, keys should not be able to encrypt data. b. The deactivated state should transition to the destroyed state when keys are no longer needed. c. Metadata should be retained for audit purposes. d. All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to deactivate keys at the time of their expiration date, which include
provisions for legal and regulatory requirements.