CEK-21: Are key management system processes, procedures, and technical measures being
defined, implemented, and evaluated to track and report all cryptographic materials
and status changes that include legal and regulatory requirements provisions?
Cryptographic Key Management Systems (CKMS), whether manual or automated, exist to process, control, store and report key management activity.
The CKMS should: a. Capture, track and label all changes in status. b. Continuously monitor for unknown cryptographic assets. c. Generate and distribute key information. d. Acquire or generate public-key certificates. e.Backup archive and inventory key information. f. Maintain a database that maps entities to an organization’s certificate or key structure. g. Provide maintenance and distribution of revoked key or certificate reports. h. Generate audit requests and process audit responses. i. Crypto materials include keys, certificates, and HSMs. j. Key management technology and processes should be NIST FIPS validated and NSA-approved. k. Cryptographic key management system security policies should protect the confidentiality, integrity, availability, and source authentication of all keys, certificates, algorithms, and metadata. l. All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures in order for the key management system to track and report all cryptographic
materials and changes in status, which include provisions for legal and regulatory
requirements.