Security/Guidelines/Key Management: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
Line 15: Line 15:
</td>
</td>
</tr></table>
</tr></table>
= Data classification and handling=
== Key material ==
Key material identifies the cryptographic secrets that compose a key. All key material must be treated as restricted data, meaning that only individual with specific training and need-to-know should have access to key material.
Key material must be encrypted on transmission. Key material can be stored in clear text, but with proper access control.
== Public certificates ==
Public certificates are public and do not require specific access control or encryption.


= Algorithms by security levels =
= Algorithms by security levels =
Line 78: Line 69:
| Hash || MD5 || 64 bits
| Hash || MD5 || 64 bits
|}
|}
= Handling=
== Key material ==
Key material identifies the cryptographic secrets that compose a key. All key material must be treated as restricted data, meaning that only individual with specific training and need-to-know should have access to key material.
Key material must be encrypted on transmission. Key material can be stored in clear text, but with proper access control.
== Public certificates ==
Public certificates are public and do not require specific access control or encryption.
Confirmed users
529

edits

Navigation menu