Skip to main content

💼 SC-12 Cryptographic Key Establishment and Management

  • ID: /frameworks/nist-sp-800-53-r5/sc/12

Description

Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].

Similar

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/data-firehouse/01
    • /frameworks/aws-fsbp-v1.0.0/eks/03
    • /frameworks/aws-fsbp-v1.0.0/kms/03
  • Internal
    • ID: dec-c-7db512e5

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DataFirehose.1] Firehose delivery streams should be encrypted at restno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EKS.3] EKS clusters should use encrypted Kubernetes secretsno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [KMS.3] AWS KMS keys should not be deleted unintentionally1no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H)1912no data
💼 FedRAMP Low Security Controls → 💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H)12no data
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected164no data
💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected140no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-12(1) Cryptographic Key Establishment and Management _ Availabilityno data
💼 SC-12(2) Cryptographic Key Establishment and Management _ Symmetric Keys14no data
💼 SC-12(3) Cryptographic Key Establishment and Management _ Asymmetric Keys7no data
💼 SC-12(4) Cryptographic Key Establishment and Management _ PKI Certificatesno data
💼 SC-12(5) Cryptographic Key Establishment and Management _ PKI Certificates / Hardware Tokensno data
💼 SC-12(6) Cryptographic Key Establishment and Management _ Physical Control of Keysno data

Policies (2)

PolicyLogic CountFlagsCompliance
🛡️ AWS KMS CMK is scheduled for deletion🟢1🟢 x6no data
🛡️ AWS KMS Symmetric CMK Rotation is not enabled🟢1🟢 x6no data