Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key destruction.
No STIG checks reference this CCI.