SC-12 Cryptographic Key Establishment and Management
Statement
WTAMU establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.
Implementation
When cryptography is required and employed within the University information system(s), the University establishes and manages cryptographic keys using automated mechanisms with supporting procedures or manual procedures. Cryptographic keys managed by the University will be done in a manner to protect keys from disclosure, including proper storage access controls, exchange, and destruction