💼 SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT
- ID:
/frameworks/nist-sp-800-53-r4/sc/12
Description
The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
Similar
- Internal
- ID:
dec-c-2411c0ba
- ID:
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 NIST CSF v1.1 → 💼 PR.DS-1: Data-at-rest is protected | 15 | 30 | no data | ||
| 💼 NIST CSF v1.1 → 💼 PR.DS-2: Data-in-transit is protected | 16 | 53 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 SC-12 (1) AVAILABILITY | no data | ||||
| 💼 SC-12 (2) SYMMETRIC KEYS | 1 | 1 | no data | ||
| 💼 SC-12 (3) ASYMMETRIC KEYS | 1 | 1 | no data | ||
| 💼 SC-12 (4) PKI CERTIFICATES | no data | ||||
| 💼 SC-12 (5) PKI CERTIFICATES _ HARDWARE TOKENS | no data |
Policies (5)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS Account Root User has active access keys🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User Access Keys are not rotated every 90 days or less🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User has more than one active access key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User with console and programmatic access set during the initial creation🟢⚪ | 🟢 x2, ⚪ x1 | no data | |
| 🛡️ Google Project with KMS keys has a principal with Owner role🟢 | 1 | 🟢 x6 | no data |
Internal Rules
| Rule | Policies | Flags |
|---|---|---|
| ✉️ dec-x-0a7801fb | 1 | |
| ✉️ dec-x-30795016 | 1 | |
| ✉️ dec-x-b10e98af | 1 | |
| ✉️ dec-x-bcb0c78f | 1 |