Cryptography Encryption and Key Management (CEK)

Level N/A

Define, implement and evaluate processes, procedures and technical measures to create keys in a pre-activated state when they have been generated but not authorized for use, which include provisions for legal and regulatory requirements.


Login