CEK-11: Are private keys provisioned for a unique purpose managed, and is cryptography
secret?
Key distribution is the process of logically or physically transferring keys. a. Distribution of asymmetric key pairs (public, ephemeral, centrally) requires protection mechanisms. b. Distribution of symmetric keys requires their own protection mechanisms. c. Distribution of other key materials requires their own protection mechanisms. d. Distributed keys should be protected at rest, in storage, in transit, and to the appropriate extent (even when in use). e. Distribution controls must address confidentiality, integrity, and availability. f. Manual or automated (preferable) distribution may be used. g. All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Control implemented
Control ownership
Description
Manage cryptographic secret and private keys that are provisioned
for a unique purpose.