Beruflich Dokumente
Kultur Dokumente
IT Security
Key Management Checklist
General
The need for encryption has been determined by the owners of information.
Whenever encryption is used, the Organization personnel have not deleted the
sole readable version of data before first demonstrating that the encryption
process is able to re-establish a readable version of the data
Encryption Schemes
The following encryption schemes may be made use of. Sometimes
combinations of schemes are used and all aspects of these schemes must
be adhered to. Which scheme has been implemented?
Symmetric, i.e. DES, Triple DES, AES
Asymmetric, i.e. RSA, PKA
DUKPT
Certificates
Encryption Algorithms
The encryption made use of is an approved, commercially available
algorithm and has been implemented as recommended.
A proprietary algorithm has been made use of and has been approved by IT
Security.
The viability of the selected encryption process has been satisfactorily
demonstrated before its implementation in a production environment
IT Security
Key Management Checklist
The keys, when loaded from the individual key components, was carried out under
dual control and split knowledge.
Until the key components have been cryptographically secured, they have been
maintained using the principles of dual control and split knowledge
Individuals entrusted with a key component have ensured that no person (not
similarly entrusted with that component) can observe or otherwise ascertain the
component before, during or after key loading.
Each key component is in the physical possession of only one person or group of
persons considered trustworthy and so authorised. The person or group of persons
have been instructed to keep secret the component entrusted to them;
A single component must never be in the physical possession of a person or group
of persons when any one such person is or ever has been similarly entrusted with
any other component of this key.
If the component is not in human readable form (for example, in a PROM module), it
must be in the physical possession of only one person or group of persons and for
the minimum practical time.
If the component is in human readable form (for example, printed, as within a
secure mailer), it must be known to only one person (or alternate) and only for the
duration of time required for this person to enter the key component into a TRSM or
a minimum-acceptable PIN Entry Device;
Each component of the key was generated and stored by a separate person
IT Security
Key Management Checklist
IT Security
Key Management Checklist
Security Concept 8 : Compromise of Keys
The original key compromised has been replaced with a new one.
The new key has replaced all keys encrypted under or derived from the
compromised key.
All data protected by the compromised key has been transformed to be encrypted
under the new key.