5 - Key management

Overview

Key management is the set of techniques and procedures supporting the establishment and maintenance of keying relationships between parties and components in the public key infrastructure. Key management encompasses techniques and procedures supporting:

  • Initialization of system users and components;
  • Generation, distribution, and installation of keying material;
  • Controlling the use of keying material;
  • Update, revocation, and destruction of keying material; and
  • Storage, backup/recovery, and archival of keying material.

The key management is important for the PKI to maintain trust. It should be an integral part of the PKI procedures. Proper key management is one of the basic stones on which the PKI stands and relies on.

Requirements

#RequirementWeight
1Key management roles and responsibilities are documented and formally assigned2
2Inventory of cryptographic keys is documented and maintained2
3Inventory of cryptographic devices is documented and maintained1
4Each cryptographic key is defined and has documented lifecycle procedures2
5Cryptographic cipher suites and protocols are documented and maintained2
6Key management is periodically reviewed and updated3

Details

Key management roles and responsibilities are documented and formally assigned

Guidance

Proper definition of roles and responsibilities for key management operations establishes a good basis for accountability and auditing. The roles and responsibilities should follow key management policy, principles, and boundaries.

Personnel should be formally assigned to the role based on appropriate skills, and background check to ensure that there are no external risks associated that can cause potential compromise of key management.

Naming or assignment records should contain relevant information such as:

  • Identification of personnel
  • Role to be assigned
  • Date of appointment
  • Confirmation of required skills
  • Acknowledgment of responsibilities

Assessment

  • Documented roles and responsibilities
  • Signed naming protocol of personnel to role(s)
  • Roles and responsibilities matrix (that may be used to cross-check if there are any conflicting roles)
  • Validation of required knowledge and skills
  • Review according to the key management policy

References

Inventory of cryptographic keys is documented and maintained

Guidance

Inventory of cryptographic keys is important and a strategic database for organizations to:

  • Monitor cryptographic key status and compliance
  • Quickly react to changes and incidents (deprecation of algorithms, compromise, new attacks and vulnerabilities)
  • Understand impact of lifecycle changes, migration and use of keys

Although the cryptographic key inventory may be implemented and maintained using various tools and approaches, it should serve the purpose of having a consistent and accurate map of all cryptographic keys deployed in the organization with details like algorithm, key length, usage, storage, location, generation and distribution method, backup and recovery, key check value, fingerprint, number of share or components, owner or responsible person, uniqueness, crypto-periods, or any other applicable attributes and properties of the key.

Inventory should follow procedures and business as usual activities to keep it accurate and updated in time.

Assessment

  • Documented inventory of cryptographic keys
  • Accuracy and consistency
  • Completeness of inventory
  • Validation of cryptographic key records

References

Inventory of cryptographic devices is documented and maintained

Guidance

Sensitive cryptographic keys are protected by hardware security modules that can have various forms and comply with security standards such as FIPS 140-3 or Common Criteria Protection Profiles. The keys may be in some case software-protected when there is no high risk associated with its compromise.

The approved ways of protecting cryptographic keys should have defined rules, which can be specified by the key management policy and followed using the key management procedures. Cryptographic devices that protect keys may be quickly identified using the inventory of cryptographic keys with reference to an inventory of cryptographic devices.

The inventory of cryptographic devices should contain relevant information such as:

  • Vendor and device model identification
  • Serial numbers
  • Hardware / firmware / software versions
  • Security certification and expiration dates
  • Locations

Assessment

  • Documented requirements for cryptographic devices
  • Documented inventory of cryptographic devices
  • Completeness, accuracy, and consistency of inventory
  • Validation of records

References

Each cryptographic key is defined and has documented lifecycle procedures

Guidance

Each cryptographic key type that is defined and used for specific use-case should have a complete description of its lifecycle. Each lifecycle phase has a proper description of the process and is backed up with the procedure that is executed when needed.

The key can have various lifecycle phases, such as generation, registration, initialization, distribution, loading, storage, archiving, backup, recovery, revocation, removal, destruction, or others applicable for the key.

The lifecycle phases contains appropriate description of the procedure such as:

  • Prerequisites for execution
  • Required roles and permissions
  • Procedure and records

Assessment

  • Examine the definition of cryptographic key
  • Documented key lifecycle phases
  • Documented procedures and related records for the key lifecycle
  • Lifecycle is integrated and followed in the organization

References

Cryptographic cipher suites and protocols are documented and maintained

Guidance

Protocols and encryption strengths may quickly change or be deprecated due to identification of vulnerabilities or design flaws. In order to support current and future data security needs, the organization should know where cryptography is used and understand how they would be able to respond rapidly to changes impacting the strength of their cryptographic implementations.

Specific rules and boundaries to be applied for cryptographic cipher suites and protocols should be documented in encryption management policy that reflect the current status of cryptography practice.

Cipher suites and protocols should be regularly checked against the implemented technology and configuration. Any deviation from the documented and allowed protocols should be fixed.

Assessment

  • Documented encryption management policy
  • Validation of implementation and used protocols against what is documented
  • Accuracy of the description
  • Security and vulnerabilities of applicable cipher suites and protocols

References

Key management is periodically reviewed and updated

Guidance

Key management policy, processes and procedures related to cryptographic keys, inventory and lifecycle should be periodically reviewed, updated and approved. The frequency of review should be based on the organizational risks and needs to be protected against current and future trends.

Periodical review helps to keep the key management accurate and helps to maintain required skills and knowledge. It provides assurance that the expected controls are active and working as intended.

Assessment

  • Risk management and review frequency
  • Implementation of review process
  • Validation of documentation and reviews

References

Participate in our community discussions and/or join the consortium