CMMC 1.0 Practice SC.3.187 Requirement:

Establish and manage cryptographic keys for cryptography employed in organizational systems.

CMMC 1.0 SC.3.187 Requirement Explanation:

Cryptographic key management system provide for the management of cryptographic keys including generation, distribution, storage, backup, archive, recovery, use, revocation, and destruction. Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates.

Example CMMC 1.0 SC.3.187 Implementation:

Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates. Create an inventory of your cryptographic keys and determine who is responsible for which keys. Create a policy covering the life cycle of your encryption keys. Use a key management system to protect cryptographic keys. If you do not have many keys, you can accomplish this manually.

CMMC 1.0 SC.3.187 Scenario(s):

- Scenario 1:

Your company uses SSH keys to access its server and network devices. To prevent an attacker from accessing the keys you use a key management system and have a robust key management policy. In accordance with your policy, new keys are generated every few months. Only authorized individuals are provided the keys. They are not allowed to provide it to others. Your policy states that keys must stored in an encrypted format. Your key management system handles the distribution storage, backup, use, revocation, and destruction of keys. This is more efficient than a manual process.
 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 NIST SP 800-171 & CMMC Compliance App

NIST SP 800-171 & CMMC Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.