Control Requirements
LS-07: Encryption Key Management
Secure storage and access control for encryption keys based on job function
Control Description
Encryption keys are maintained within a secured location, and access is limited to appropriate users based on job function.
Plain Meaning
This control requires organizations to store encryption keys in a secure location and restrict access to only those users who need access to encryption keys for their job responsibilities. This ensures that encryption keys are protected from unauthorized access and misuse.
Implementation
Key Management Strategy
Secure Storage Requirements
- Store encryption keys in a secure, dedicated location
- Implement access controls based on job function
- Use hardware security modules (HSM) when possible
- Separate key storage from encrypted data
- Implement key backup and recovery procedures
Access Control
- Only users with encryption responsibilities can access keys
- Implement role-based access control for key management
- Use multi-factor authentication for key access
- Log all key access and usage activities
- Regular review of key access permissions
Implementation Approach
Key Storage Options
- Hardware Security Modules (HSM): Most secure, dedicated hardware
- Cloud Key Management: AWS KMS, Azure Key Vault, Google Cloud KMS
- Software Key Management: HashiCorp Vault, CyberArk
- Secure File Storage: Encrypted files with access controls
Simple Implementation Steps
- Inventory Encryption Keys: Document all encryption keys in use
- Define Access Roles: Determine who needs access to which keys
- Implement Secure Storage: Choose appropriate key storage solution
- Configure Access Controls: Set up role-based access permissions
- Enable Logging: Implement comprehensive audit logging
- Establish Procedures: Create key management policies and procedures
Key Management Procedures
- Key generation and distribution
- Key rotation schedules
- Key backup and recovery
- Key destruction procedures
- Emergency key access procedures
Key Success Factors
- Secure Storage: Encryption keys stored in protected location
- Access Control: Only authorized users can access keys
- Audit Logging: Complete record of key access and usage
- Regular Reviews: Quarterly review of key access permissions
- Documentation: Clear procedures for key management
Common Pitfalls to Avoid
- Insecure Storage: Keys stored in unsecured locations
- Over-Permissioning: Too many users have key access
- No Logging: Missing audit trail of key access
- No Rotation: Not regularly rotating encryption keys
Related Controls
- LS-01: Database encryption at rest
- LS-06: Password vault for administrator accounts
- LS-16: Encrypted transmissions