Under active development Content is continuously updated and improved

CM0030CM0030

>Control Description

Leverage best practices for crypto key management as defined by organization like NIST or the National Security Agency. Leverage only approved cryptographic algorithms, cryptographic key generation algorithms or key distribution techniques, authentication techniques, or evaluation criteria. Encryption key handling should be performed outside of the onboard software and protected using cryptography. Encryption keys should be restricted so that they cannot be read via any telecommands.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.