STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← All Controls

SC-12

System and Communications ProtectionRev 3

Cryptographic Key Establishment and Management

CCI Identifiers (17)

CCI-001137The organization establishes cryptographic keys for required cryptography employed within the information system.CCI-001138The organization manages cryptographic keys for required cryptography employed within the information system.CCI-002428Defines the requirements for cryptographic key generation to be employed within the system.CCI-002429Defines the requirements for cryptographic key distribution to be employed within the system.CCI-002430Defines the requirements for cryptographic key storage to be employed within the system.CCI-002431Defines the requirements for cryptographic key access to be employed within the system.CCI-002432Defines the requirements for cryptographic key destruction to be employed within the system.CCI-002433Establish cryptographic keys when cryptography is employed within the system in accordance with organization-defined requirements for key generation.CCI-002434Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key distribution.CCI-002435Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key storage.CCI-002436Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key access.CCI-002437Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key destruction.CCI-002438Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key generation.CCI-002439Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key distribution.CCI-002440Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key storage.CCI-002441Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key access.CCI-002442Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key destruction.

Linked STIG Checks (2)

Across 2 STIGs. Click to expand.