πΌ SC-12(3) Cryptographic Key Establishment and Management | Asymmetric Keys
Descriptionβ
Produce, control, and distribute asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; certificates issued in accordance with organization-defined requirements].
Similarβ
- Sections
/frameworks/aws-fsbp-v1.0.0/api-gateway/02
/frameworks/aws-fsbp-v1.0.0/cloudfront/03
/frameworks/aws-fsbp-v1.0.0/cloudfront/07
/frameworks/aws-fsbp-v1.0.0/cloudfront/08
/frameworks/aws-fsbp-v1.0.0/cloudfront/10
/frameworks/aws-fsbp-v1.0.0/elasticache/05
/frameworks/aws-fsbp-v1.0.0/elb/01
/frameworks/aws-fsbp-v1.0.0/elb/02
/frameworks/aws-fsbp-v1.0.0/elb/03
/frameworks/aws-fsbp-v1.0.0/elb/08
/frameworks/aws-fsbp-v1.0.0/elb/17
/frameworks/aws-fsbp-v1.0.0/es/08
/frameworks/aws-fsbp-v1.0.0/opensearch/08
/frameworks/aws-fsbp-v1.0.0/s3/05
- Internal
Similar Sections (Take Policies From)β
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (6)β