CMMC Practice Requirement:
Establish and manage cryptographic keys for cryptography employed in organizational systems.
CMMC Requirement Explanation:
Cryptographic key management system provide for the management of cryptographic keys including generation, distribution, storage, backup, archive, recovery, use, revocation, and destruction. Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates.
Example CMMC Implementation:
Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates. Create an inventory of your cryptographic keys and determine who is responsible for which keys. Create a policy covering the life cycle of your encryption keys. Use a key management system to protect cryptographic keys. If you do not have many keys, you can accomplish this manually.
- Scenario 1:
Your company uses SSH keys to access its server and network devices. To prevent an attacker from accessing the keys you use a key management system and have a robust key management policy. In accordance with your policy, new keys are generated every few months. Only authorized individuals are provided the keys. They are not allowed to provide it to others. Your policy states that keys must stored in an encrypted format. Your key management system handles the distribution storage, backup, use, revocation, and destruction of keys. This is more efficient than a manual process.
Discover Our NIST SP 800-171 Solutions:
For contractors seeking compliance
For IT service providers
Supply Chain Verifier
For contractors seeking to verify partner compliance