Skip to main content

💼 SC-12 Cryptographic Key Establishment and Management

  • ID: /frameworks/nist-sp-800-53-r5/sc/12

Description​

Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/data-firehouse/01
    • /frameworks/aws-fsbp-v1.0.0/eks/03
    • /frameworks/aws-fsbp-v1.0.0/kms/03
  • Internal
    • ID: dec-c-7db512e5

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DataFirehose.1] Firehose delivery streams should be encrypted at restno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EKS.3] EKS clusters should use encrypted Kubernetes secretsno data
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [KMS.3] AWS KMS keys should not be deleted unintentionallyno data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H)1911no data
💼 FedRAMP Low Security Controls → 💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H)11no data
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected148no data
💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected125no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SC-12(1) Cryptographic Key Establishment and Management _ Availabilityno data
💼 SC-12(2) Cryptographic Key Establishment and Management _ Symmetric Keys11no data
💼 SC-12(3) Cryptographic Key Establishment and Management _ Asymmetric Keys6no data
💼 SC-12(4) Cryptographic Key Establishment and Management _ PKI Certificatesno data
💼 SC-12(5) Cryptographic Key Establishment and Management _ PKI Certificates / Hardware Tokensno data
💼 SC-12(6) Cryptographic Key Establishment and Management _ Physical Control of Keysno data