
Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
sc-12(3) |
cryptographic key establishment and management | asymmetric keys |
|
|
assessment objective: Determine if the organization produces, controls, and distributes asymmetric cryptographic keys using one of the following: |
|
sc-12(3)[1] |
NSA-approved key management technology and processes; |
|
sc-12(3)[2] |
approved PKI Class 3 certificates or prepositioned keying material; or |
|
sc-12(3)[3] |
approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user’s private key. |
|
potential assessment methods and objects: Examine: [select from: System and communications protection policy; procedures addressing cryptographic key establishment and management; information system design documentation; information system configuration settings and associated documentation; information system audit records; list of NSA-approved cryptographic products; list of approved PKI Class 3 and Class 4 certificates; other relevant documents or records]. Interview: [select from: System/network administrators; organizational personnel with information security responsibilities; system developer; organizational personnel with responsibilities for cryptographic key establishment or management; organizational personnel with responsibilities for PKI certificates]. Test: [select from: Automated mechanisms supporting and/or implementing asymmetric cryptographic key establishment and management]. |
||