STIGhub
STIGs
RMF Controls
Compare
← All Controls
SC-12 (3)
System and Communications Protection
Rev 3
Cryptographic Key Establishment and Management
CCI Identifiers (5)
CCI-001141
The organization produces, controls, and distributes symmetric and asymmetric cryptographic keys using NSA-approved key management technology and processes.
CCI-002446
Produce asymmetric cryptographic keys using: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; or certificates issued in accordance with organization-defined requirements.
CCI-002447
Control asymmetric cryptographic keys using: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; or certificates issued in accordance with organization-defined requirements.
CCI-002448
Distribute asymmetric cryptographic keys using: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; or certificates issued in accordance with organization-defined requirements.
CCI-004898
Defines requirements for certificates that are issued for producing, controlling, and distributing asymmetric cryptographic keys.
Linked STIG Checks (9)
Across 5 STIGs. Click to expand.
▶
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
3 checks
▶
IBM z/OS RACF Security Technical Implementation Guide
1 check
▶
IBM z/OS TSS Security Technical Implementation Guide
1 check
▶
IBM zVM Using CA VM:Secure Security Technical Implementation Guide
1 check
▶
Kubernetes Security Technical Implementation Guide
3 checks