CMMC 1.0 Practice SC.3.187 Requirement:
Establish and manage cryptographic keys for cryptography employed in organizational systems.
CMMC 1.0 SC.3.187 Requirement Explanation:
Cryptographic key management system provide for the management of cryptographic keys including generation, distribution, storage, backup, archive, recovery, use, revocation, and destruction. Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates.
Example CMMC 1.0 SC.3.187 Implementation:
Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates. Create an inventory of your cryptographic keys and determine who is responsible for which keys. Create a policy covering the life cycle of your encryption keys. Use a key management system to protect cryptographic keys. If you do not have many keys, you can accomplish this manually.
CMMC 1.0 SC.3.187 Scenario(s):
- Scenario 1:
Your company uses SSH keys to access its server and network devices. To prevent an attacker from accessing the keys you use a key management system and have a robust key management policy. In accordance with your policy, new keys are generated every few months. Only authorized individuals are provided the keys. They are not allowed to provide it to others. Your policy states that keys must stored in an encrypted format. Your key management system handles the distribution storage, backup, use, revocation, and destruction of keys. This is more efficient than a manual process.
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you