Cryptography Encryption and Key Management (CEK)

Level N/A

Define, implement and evaluate processes, procedures and technical measures to manage archived keys in a secure repository requiring least privilege access, which include provisions for legal and regulatory requirements.


Login

Cryptography Encryption and Key Management (CEK)

Level N/A

Define, implement and evaluate processes, procedures and technical measures to use compromised keys to encrypt information only in controlled circumstance, and thereafter exclusively for decrypting data and never for encrypting data, which include provisions for legal and regulatory requirements.


Login

Cryptography Encryption and Key Management (CEK)

Level N/A

Define, implement and evaluate processes, procedures and technical measures to assess the risk to operational continuity versus the risk of the keying material and the information it protects being exposed if control of the keying material is lost, which include provisions for legal and regulatory requirements.


Login

Cryptography Encryption and Key Management (CEK)

Define, implement and evaluate processes, procedures and technical measures in order for the key management system to track and report all cryptographic materials and changes in status, which include provisions for legal and regulatory requirements.


Login

Datacenter Security (DCS)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the secure disposal of equipment used outside the organization's premises. If the equipment is not physically destroyed a data destruction procedure that renders recovery of information impossible must be applied. Review and update the policies and procedures at least annually.


Login

Datacenter Security (DCS)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the relocation or transfer of hardware, software, or data/information to an offsite or alternate location. The relocation or transfer request requires the written or cryptographically verifiable authorization. Review and update the policies and procedures at least annually.


Login

Datacenter Security (DCS)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for maintaining a safe and secure working environment in offices, rooms, and facilities. Review and update the policies and procedures at least annually.


Login

Datacenter Security (DCS)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the secure transportation of physical media. Review and update the policies and procedures at least annually.


Login

Datacenter Security (DCS)

Classify and document the physical, and logical assets (e.g., applications) based on the organizational business risk.


Login

Datacenter Security (DCS)

Catalogue and track all relevant physical and logical assets located at all of the CSP's sites within a secured system.


Login