31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

March, 2007<br />

to be saved. Keys for the authentication of stored or transmitted information may also<br />

need to be saved.<br />

2. How and where the keying material would be saved? For example, the keying material<br />

could be stored in a safe by the individual who initiates the protection of the information<br />

(e.g., the encrypted information), or the keying material could be saved automatically<br />

when the protected information is transmitted, received or stored. The keying material<br />

could be saved locally or at some remote site.<br />

3. Who will be responsible for protecting the KRI? Each individual, organization or suborganization<br />

could be responsible for their own keying material, or an external<br />

organization could perform this function.<br />

4. Who can request key recovery and under what conditions? For example, the individual<br />

who protected the information (i.e., used and stored the KRI) or the organization to which<br />

the individual is assigned could recover the keying material. Legal requirements may<br />

need to be considered. An organization could request the information when the individual<br />

who stored the KRI is not available.<br />

5. Under what conditions could the policy be modified and by whom?<br />

6. What audit capabilities and procedures would be included in the KRS? The policy shall<br />

identify the events to be audited. Auditable events might include KRI requests and their<br />

associated responses; who made a request and when; the startup and shutdown of audit<br />

functions; the operations performed to read, modify or destroy the audit data; requests to<br />

access user authentication data; and the uses of authentication mechanisms.<br />

7. How the KRS would deal with aged keying material or the destruction of the keying<br />

material?<br />

8. Who would be notified when keying material is recovered and under what conditions?<br />

For example, the individual who encrypted data and stored the KRI could be notified<br />

when the organization recovers the decryption key because the person is absent, but the<br />

individual might not be notified when the organization is monitoring the activities of that<br />

individual.<br />

9. The procedures that need to be followed when the KRS or some portion of the data<br />

within the KRS is compromised.<br />

138

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!