// Level 3 · Controls

Cryptography, Encryption & Key Management

CEK domain controls.

CEK-01High

Encryption and Key Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for cryptography, encryption and key management.

CEK-02Medium

CEK Roles and Responsibilities

Define and implement cryptographic, encryption and key management roles and responsibilities.

CEK-03High

Data Encryption

Provide cryptographic protection to data at-rest and in-transit, using cryptographic libraries certified to approved standards.

CEK-04High

Encryption Algorithm

Use encryption algorithms that are appropriate for data protection.

CEK-05High

Encryption Change Management

Establish a standard change management procedure to accommodate changes from internal and external sources, for review, approval, implementation and communication.

CEK-06High

Encryption Change Cost Benefit Analysis

Manage and adopt changes to cryptography-, encryption-, and key management-related systems that may impact CSCs.

CEK-07High

Encryption Risk Management

Establish a standard process to identify and assess the risks of cryptographic, encryption and key management techniques.

CEK-08High

CSC Key Management Capability

Provide CSCs with the capability to manage their own data encryption keys.

CEK-09High

Encryption and Key Management Audit

Audit encryption and key management systems, policies, and processes with a frequency that is proportional to the risk exposure of the system.

CEK-10High

Key Generation

Generate cryptographic keys using industry accepted cryptographic libraries.

CEK-11High

Key Purpose

Manage cryptographic secret and private keys that are provisioned for a unique purpose.

CEK-12High

Key Rotation

Rotate cryptographic keys in accordance with the calculated cryptoperiod.

CEK-13High

Key Revocation

Define, implement and evaluate processes, procedures and technical measures to revoke and remove cryptographic keys prior to the end of its established cryptoperiod.

CEK-14High

Key Destruction

Define, implement and evaluate processes, procedures and technical measures to destroy unneeded keys.

CEK-15High

Key Activation

Define, implement and evaluate processes, procedures and technical measures to create keys in a pre-activated state when they have been generated but not authorized for use.

CEK-16High

Key Suspension

Define, implement and evaluate processes, procedures and technical measures to monitor, review and approve key transitions.

CEK-17High

Key Deactivation

Define, implement and evaluate processes, procedures and technical measures to deactivate keys at the time of their expiration date.

CEK-18High

Key Archival

Define, implement and evaluate processes, procedures and technical measures to manage archived keys in a secure repository.

CEK-19High

Key Compromise

Define, implement and evaluate processes, procedures and technical measures to use compromised keys to encrypt information only in controlled circumstances.

CEK-20High

Key Recovery

Define, implement and evaluate processes, procedures and technical measures to assess the risk to operational continuity versus the risk of the keying material being compromised.

CEK-21High

Key Inventory Management

Define, implement and evaluate processes, procedures and technical measures in order for the key management system to track and report all cryptographic materials and changes in status.