SAMMY UI is optimized for resolutions with a width 1024px and higher.
Key Purpose
CEK-11: Are private keys provisioned for a unique purpose managed, and is cryptography secret?
Key distribution is the process of logically or physically transferring keys.
a. Distribution of asymmetric key pairs (public, ephemeral, centrally) requires protection mechanisms.
b. Distribution of symmetric keys requires their own protection mechanisms.
c. Distribution of other key materials requires their own protection mechanisms.
d. Distributed keys should be protected at rest, in storage, in transit, and to the appropriate extent (even when in use).
e. Distribution controls must address confidentiality, integrity, and availability.
f. Manual or automated (preferable) distribution may be used.
g. All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Control implemented
Control ownership
Description

Manage cryptographic secret and private keys that are provisioned for a unique purpose.