System and Communications Protection (SC)

Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].


Login

System and Communications Protection (SC)

Maintain availability of information in the event of the loss of cryptographic keys by users.


Login

System and Communications Protection (SC)

Produce, control, and distribute symmetric cryptographic keys using [Selection: NIST FIPS-validated; NSA-approved] key management technology and processes.


Login

System and Communications Protection (SC)

Produce, control, and distribute asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user’s private key; certificates issued in accordance with organization-defined requirements].


Login

System and Communications Protection (SC)

[Withdrawn: Incorporated into SC-13.]


Login

System and Communications Protection (SC)

[Withdrawn: Incorporated into AC-2, AC-3, AC-5, AC-6, SI-3, SI-4, SI-5, SI-7, and SI-10.]


Login

System and Communications Protection (SC)

Maintain physical control of cryptographic keys when stored information is encrypted by external service providers.


Login

System and Communications Protection (SC)

a. Determine the [Assignment: organization-defined cryptographic uses]; and b. Implement the following types of cryptography required for each specified cryptographic use: [Assignment: organization-defined types of cryptography for each specified cryptographic use].


Login

System and Communications Protection (SC)

[Withdrawn: Incorporated into SC-7.]


Login

System and Communications Protection (SC)

[Withdrawn: Technology-specific; addressed as any other technology or protocol.]


Login