CRY-08—Key Repository Access
>Control Description
Access to the cryptographic keystores is limited to authorized personnel.
Theme
Process
Type
Preventive
Policy/Standard
Cryptographic Management Policy>Implementation Guidance
1. Ensure that the access lists of the key repositories have authorized users and reviewed periodically.
>Testing Procedure
1. Inspect the access lists of the key repositories and ensure that the users listed are authorized and reviewed previously.
>Audit Artifacts
E-CRY-17
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.