💼 SC-12 Cryptographic Key Establishment and Management
- ID:
/frameworks/nist-sp-800-53-r5/sc/12
Description​
Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
Similar​
- Sections
/frameworks/aws-fsbp-v1.0.0/data-firehouse/01/frameworks/aws-fsbp-v1.0.0/eks/03/frameworks/aws-fsbp-v1.0.0/kms/03
- Internal
- ID:
dec-c-7db512e5
- ID:
Similar Sections (Take Policies From)​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [DataFirehose.1] Firehose delivery streams should be encrypted at rest | no data | ||||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [EKS.3] EKS clusters should use encrypted Kubernetes secrets | no data | ||||
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [KMS.3] AWS KMS keys should not be deleted unintentionally | no data |
Similar Sections (Give Policies To)​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 FedRAMP High Security Controls → 💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H) | 1 | 9 | 11 | no data | |
| 💼 FedRAMP Low Security Controls → 💼 SC-12 Cryptographic Key Establishment and Management (L)(M)(H) | 11 | no data | |||
| 💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected | 148 | no data | |||
| 💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected | 125 | no data |
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 SC-12(1) Cryptographic Key Establishment and Management _ Availability | no data | ||||
| 💼 SC-12(2) Cryptographic Key Establishment and Management _ Symmetric Keys | 1 | 1 | no data | ||
| 💼 SC-12(3) Cryptographic Key Establishment and Management _ Asymmetric Keys | 6 | no data | |||
| 💼 SC-12(4) Cryptographic Key Establishment and Management _ PKI Certificates | no data | ||||
| 💼 SC-12(5) Cryptographic Key Establishment and Management _ PKI Certificates / Hardware Tokens | no data | ||||
| 💼 SC-12(6) Cryptographic Key Establishment and Management _ Physical Control of Keys | no data |