The key generation process should be cryptographically secure.
a. Keys should be generated:
using random bit generators (RBGs) and possibly other parameters, or
generated based on keys that are created in this fashion.
b. Key management technology and processes should be NIST FIPS validated or NSA-approved or comparable.
c. All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Generate Cryptographic keys using industry accepted cryptographic libraries specifying the algorithm strength and the random number generator used.