SC-12: Cryptographic Key Establishment and Management

From NIST's SP800-53:

Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.DS-1 Data-at-rest is protected
PR.DS-2 Data-in-transit is protected

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1552.002 Credentials in Registry Credential Access
T1573.002 Asymmetric Cryptography Command and Control
T1072 Software Deployment Tools Execution, Lateral Movement
T1552 Unsecured Credentials Credential Access
T1563.001 SSH Hijacking Lateral Movement
T1098.004 SSH Authorized Keys Persistence, Privilege Escalation
T1573.001 Symmetric Cryptography Command and Control
T1573 Encrypted Channel Command and Control
T1552.001 Credentials In Files Credential Access
T1552.004 Private Keys Credential Access