Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between parties and components in the public key infrastructure. Key management encompasses techniques and procedures supporting:
- initialization of system users and components;
- generation, distribution, and installation of keying material;
- controlling the use of keying material;
- update, revocation, and destruction of keying material; and
- storage, backup/recovery, and archival of keying material.
The key management is important for the public key infrastructure to maintain trust. It should be integral part of the PKI procedures. Proper key management is one of the basic stones on which the PKI stands and relies on.
|1||Key management roles and responsibilities are documented and formally assigned||2|
|2||Inventory of cryptographic keys is documented and maintained||2|
|3||Inventory of cryptographic devices is documented and maintained||1|
|4||Each cryptographic key is defined and has documented lifecycle procedures||2|
|5||Cryptographic cipher suites and protocols are documented and maintained||2|
|6||Key management is periodically reviewed and updated||3|
Key management roles and responsibilities are documented and formally assigned
Proper definition of roles and responsibilities for key management operations establishes a good basis for accountability and auditing. The roles and responsibilities should follow key management policy, principles, and boundaries.
Personnel should be formally assigned to the role based on appropriate skills, and background check to ensure that there are no external risks associated that can cause potential compromise of key management.
Naming or assignment record should contain relevant information such as:
- identification of personnel
- role to be assigned
- date of appointment
- confirmation of required skills
- acknowledgment of responsibilities
- Documented roles and responsibilities
- Signed naming protocol of personnel to role(s)
- Roles and responsibilities matrix (that may be used to cross-check if there are any conflicting roles)
- Validation of required knowledge and skills
- Review according the key management policy
Inventory of cryptographic keys is documented and maintained
Inventory of cryptographic keys is important and strategic database for organization to:
- monitor cryptographic key status and compliance
- quickly react on changes and incidents (deprecation of algorithms, compromise, new attacks and vulnerabilities)
- understand impact of lifecycle changes, migration and using keys
Although cryptographic key inventory may be implemented and maintained using various tools and approaches, it should serve the purpose of having consistent and accurate map of all cryptographic keys deployed in organization with details like algorithm, key length, usage, storage, location, generation and distribution method, backup and recovery, key check value, fingerprint, number of share or components, owner or responsible person, uniqueness, crypto-periods, or any other application attributes and properties of the key.
Inventory should follow procedures and business as usual activities to keep it accurate and updated in time.
- Documented inventory of cryptographic keys
- Accuracy and consistency
- Completeness of inventory
- Validation od cryptographic key records
Inventory of cryptographic devices is documented and maintained
Sensitive cryptographic keys are protected by hardware security modules that can have various forms and complies with security standards such as FIPS 140-3 or Common Criteria Protection Profiles. The keys may be in some case software-protected when there is no high risk associated with its compromise.
The approved ways of protecting cryptographic keys should have defined rules, which can be specified by the key management policy and followed using the key management procedures. Cryptographic devices that protect keys may be quickly identified using inventory of cryptographic keys with reference to inventory of cryptographic devices.
The inventory of cryptographic devices should contain relevant information such as:
- vendor and device model identification
- serial numbers
- hardware / firmware / software versions
- security certification and expiration dates
- Documented requirements on cryptographic devices
- Documented inventory of cryptographic devices
- Completeness, accuracy, and consistency of inventory
- Validation of records
Each cryptographic key is defined and has documented lifecycle procedures
Each cryptographic key type that is defined and used for specific use-case should have complete description of its lifecycle. Each lifecycle phase has proper description of process and is backed up with the procedure that is executed when needed.
The key can have various lifecycle phases, such as generation, registration, initialization, distribution, loading, storage, archiving, backup, recovery, revocation, removal, destruction, or other applicable for the key.
The lifecycle phases contains appropriate description of the procedure such as:
- prerequisites for execution
- required roles and permissions
- procedure and records
- Examine the definition of cryptographic key
- Documented key lifecycle phases
- Documented procedures and related records for the key lifecycle
- Lifecycle is integrated and followed in organization
Cryptographic cipher suites and protocols are documented and maintained
Protocols and encryption strengths may quickly change or be deprecated due to identification of vulnerabilities or design flaws. In order to support current and future data security needs, organization should know where cryptography is used and understand how they would be able to respond rapidly to changes impacting the strength of their cryptographic implementations.
Specific rules and boundaries to be applied for cryptographic cipher suites and protocols should be documented in encryption management policy that reflect the current status of cryptography practice.
Cipher suites and protocols should be regularly checked against the implemented technology and configuration. The deviation from the documented and allowed protocols should be fixed.
- Documented encryption management policy
- Validation of implementation and used protocols against what is documented
- Accuracy of the description
- Security and vulnerabilities of applicable cipher suites and protocols
- NIST SP 800-57 Recommendation for Key Management
- ISO/IEC 11770 Key Management
- NIST SP 800-131A Transitioning the Use of Cryptographic Algorithms and Key Lengths
Key management is periodically reviewed and updated
Key management policy, processes and procedures related to cryptographic keys, inventory and lifecycle should be periodically reviewed, updated and approved. The frequency of review should be based on the organizational risks and needs to be protected against current and future trends.
Periodical review helps to keep the key management accurate and helps to maintain required skills and knowledge. It provides also assurance that the expected controls are active and working as intended.
- Risk management and review frequency
- Implementation of review process
- Validation of documentation and reviews