Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
March, 2007<br />
to be saved. Keys for the authentication of stored or transmitted information may also<br />
need to be saved.<br />
2. How and where the keying material would be saved? For example, the keying material<br />
could be stored in a safe by the individual who initiates the protection of the information<br />
(e.g., the encrypted information), or the keying material could be saved automatically<br />
when the protected information is transmitted, received or stored. The keying material<br />
could be saved locally or at some remote site.<br />
3. Who will be responsible for protecting the KRI? Each individual, organization or suborganization<br />
could be responsible for their own keying material, or an external<br />
organization could perform this function.<br />
4. Who can request key recovery and under what conditions? For example, the individual<br />
who protected the information (i.e., used and stored the KRI) or the organization to which<br />
the individual is assigned could recover the keying material. Legal requirements may<br />
need to be considered. An organization could request the information when the individual<br />
who stored the KRI is not available.<br />
5. Under what conditions could the policy be modified and by whom?<br />
6. What audit capabilities and procedures would be included in the KRS? The policy shall<br />
identify the events to be audited. Auditable events might include KRI requests and their<br />
associated responses; who made a request and when; the startup and shutdown of audit<br />
functions; the operations performed to read, modify or destroy the audit data; requests to<br />
access user authentication data; and the uses of authentication mechanisms.<br />
7. How the KRS would deal with aged keying material or the destruction of the keying<br />
material?<br />
8. Who would be notified when keying material is recovered and under what conditions?<br />
For example, the individual who encrypted data and stored the KRI could be notified<br />
when the organization recovers the decryption key because the person is absent, but the<br />
individual might not be notified when the organization is monitoring the activities of that<br />
individual.<br />
9. The procedures that need to be followed when the KRS or some portion of the data<br />
within the KRS is compromised.<br />
138