Zusammenfassung der Ressource
Crypto U10 (part 2), Key
Management and Lifecycle
- lifecycle (continued)
- key usage
- principle of key separation
- cryptographic keys
must only be used for
their intended purpose
- enforcing
- hardware based
- key tagging
- add information to key to indicate purpose
- key blocks
- format key to also contain data related to the key
- key change
- planned vs. unplanned
- sometimes it's better to withdraw key
- can be expensive
- symmetric keys can be replaced relatively easily
- public key pairs
- private keys can be replaced relatively easily
- public keys are more challenging because
they are distributed to many people potentially
- key activation
- process by which keys
are authorized for use at
any given time
- ex. I enter a passphrase and
that activates a key for use
- key destruction
- when?
- at key expiration
- when key is withdrawn before expiry
- at the end of a period of key archival
- deleting is not enough
- use data erasure or
data sanitisation
mechanims
- governing key managment
- guidance
- policy
- define overall requirements and
strategy for key management
- practice
- Define tactics that will be used
in order to achieve the key
management policy goals.
- procedure
- Document step-by-step tasks
necessary to implement the key
management practices.