Level N/A
Define, implement and evaluate processes, procedures and technical measures to use compromised keys to encrypt information only in controlled circumstance, and thereafter exclusively for decrypting data and never for encrypting data, which include provisions for legal and regulatory requirements.
Parent
Compliance Framework
CCM v4.0.10
Control Number
CEK-19
Related
Compliance Framework
ISO 27002:2022
ISO 27002:2022
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4