Working Groups

Members

The PKI Consortium brings together leading organizations committed to trustworthy digital identities and secure communication.

Browse all members →
Edit on GitHub

5 - Cryptography

Overview

The organization defines how it governs the selection, approval, documentation, visibility, and evolution of cryptographic algorithms, cryptographic parameters, and cryptographic protocols used within its PKI and related systems.

The cryptographic policy and strategic direction should be established. It ensures that cryptographic choices are deliberate, consistent, risk-based, and adaptable over time.

The organization should separate cryptographic governance (what is allowed and why) from cryptographic implementation (how cryptography is used in systems):

  • It defines what cryptography is allowed and why
  • It does not define how keys or certificates are technically managed
  • It provides a single authoritative source for cryptographic rules

Cryptographic governance may be implemented using policies, standards, profiles, baselines, or other organizational mechanisms, provided the governance outcomes defined in this category are achieved.

This category does not address the operational lifecycle of cryptographic keys or certificates, which are covered in the Key Management and Certificate Management categories.

Category maturity levels description

Maturity levelDescription
1 - InitialCryptographic algorithms and protocols are chosen locally by teams or products with little or no centralized guidance. Documentation is informal or inconsistent, and cryptographic decisions are largely reactive.
2 - BasicBasic cryptographic rules exist, such as preferred algorithms or minimum key sizes. However, documentation is incomplete, visibility into cryptographic usage is limited, and cryptographic decisions are not consistently enforced.
3 - AdvancedThe organization documents approved cryptographic algorithms, parameters, and protocols. Cryptographic terminology is standardized, cryptographic profiles are defined, and visibility into cryptographic usage exists for critical systems.
4 - ManagedCryptographic governance is comprehensive and consistently applied. The organization actively manages cryptographic lifecycles, monitors cryptographic usage, and plans cryptographic transitions based on risk, standards evolution, and business impact.
5 - OptimizedCryptographic governance is proactive and adaptive. The organization continuously assesses cryptographic risks, governs and practices cryptographic agility, and integrates cryptographic transition planning (including emerging technologies) into enterprise risk and change management processes.

Requirements

#RequirementWeight
1Cryptographic terminology and scope are defined and documented3
2Cryptographic algorithms and parameters are documented and approved5
3Cryptographic protocols and versions are documented and approved3
4Visibility into cryptographic usage is established and maintained5
5Cryptographic lifecycle and deprecation rules are defined4
6Cryptographic agility is defined and governed5

Details

Cryptographic terminology and scope are defined and documented

Guidance

Inconsistent or ambiguous terminology leads to misinterpretation of requirements, incorrect implementation, and duplication across teams. Clear terminology ensures that cryptographic policy, key management, certificate management, and change processes are aligned and understood in the same way.

The organization should define and document consistent terminology for cryptographic concepts, including:

  • Cryptographic algorithms
  • Cryptographic keys
  • Digital certificates
  • Cryptographic protocols
  • Cryptographic parameters and security levels
  • Cryptographic profiles Terminology should be used consistently across policies, standards, and procedures.

Assessment

  • Documented cryptographic definitions exist.
  • Terminology is consistently used across PKI documentation.
  • Stakeholders demonstrate a shared understanding of terms.

References

Cryptographic algorithms and parameters are documented and approved

Guidance

Without explicit approval rules, cryptographic algorithms are often selected based on defaults, legacy compatibility, or convenience. Documented approvals ensure consistent security levels, reduce technical debt, and enable controlled cryptographic evolution.

The organization should document:

  • Approved cryptographic algorithms
  • Approved cryptographic parameters (e.g., key sizes, curves)
  • Restricted, deprecated, or prohibited algorithms

Each decision should include rationale and applicability.

Assessment

  • Approved and prohibited algorithms are documented.
  • Parameter requirements are clearly defined.
  • Documentation is reviewed periodically.

References

Cryptographic protocols and versions are documented and approved

Guidance

Protocols define how cryptography is actually used in communication. Even strong algorithms can be undermined by weak or outdated protocol versions. Clear protocol governance prevents insecure defaults and uncontrolled legacy usage.

The organization should define which cryptographic protocols and protocol versions are approved, restricted, deprecated, or prohibited.

Assessment

  • Protocol and version rules are documented.
  • Deprecated or prohibited protocols are identified.
  • Exceptions are formally approved.

References

Visibility into cryptographic usage is established and maintained

Guidance

Cryptographic risk cannot be managed if cryptographic usage is unknown. Visibility is essential for impact analysis, deprecation planning, incident response, and cryptographic agility.

The organization should maintain visibility into where cryptography is used, including algorithms, keys, certificates, and protocols.

Assessment

  • Cryptographic usage information exists for critical systems.
  • Visibility supports risk and transition planning.
  • Gaps are identified and addressed.

References

Cryptographic lifecycle and deprecation rules are defined

Guidance

Cryptography degrades over time due to advances in computing and cryptanalysis. Explicit lifecycle rules prevent reactive, crisis-driven migrations and support predictable, risk-based transitions.

The organization should define rules for:

  • Approving new cryptography
  • Setting expected validity periods
  • Deprecating cryptography
  • Identifying replacement options

Assessment

  • Lifecycle and deprecation rules are documented.
  • Deprecation decisions follow defined criteria.
  • Replacement planning is evident.

References

Cryptographic agility is defined and governed

Guidance

Cryptographic change is inevitable. Organizations that define and govern cryptographic agility can respond to algorithm compromise, deprecation, and emerging requirements in a controlled and timely manner.

The organization should define governance and planning for responding to cryptographic change drivers such as:

  • algorithm compromise
  • algorithm deprecation
  • regulatory change
  • emerging cryptographic requirements

Assessment

  • Governance for cryptographic transitions is documented.
  • Transition planning aligns with organizational change management.
  • Preparedness for cryptographic transitions can be demonstrated.

References