CEK-16: Are processes, procedures, and technical measures to monitor, review and approve
key transitions (e.g., from any state to/from suspension) being defined, implemented,
and evaluated to include legal and regulatory requirement provisions?
Suspended keys are not used for a period. a. Keys may be suspended for leaves of absence or suspicion of compromise. b. Suspensions should be investigated before transitioning to activation, revocation, or replacement. c. Suspended keys should not be used to encrypt data, but they can decrypt data. d. Do not process encryption applied after the beginning of a suspension period. e. All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to monitor, review and approve key transitions from any state to/from
suspension, which include provisions for legal and regulatory requirements.