<section title="17.9. Key Management"><subsection title="Objective"><paragraph
    title="17.9.1."


><![CDATA[<p>Cryptographic keying material is protected by key management procedures.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.9.2."


><![CDATA[<p>This section covers information relating to the general management of cryptographic system material. Detailed key management guidance is not provided in this manual as there is a wide variety of cryptographic systems and technologies available, and there are varied security risks for each.</p>]]></paragraph>
<paragraph
    title="17.9.3."


><![CDATA[<p>If High Assurance Cryptographic Equipment is being used agencies are required to comply with the NZCSI standards. This is outside of the scope of this section.</p>]]></paragraph>
<paragraph
    title="17.9.4."


><![CDATA[<p>In a cloud environment, options for the management of cryptographic keys include on premises key generation and outsourcing the control of cryptographic keys to a cloud service provider.</p>]]></paragraph>
<paragraph
    title="17.9.5."


><![CDATA[<p>A number of key management offerings, such as Hold Your Own Keys (HYOK), Bring Your Own Keys (BYOK), and Control Your Own Keys (CYOK), are available. However, the implementation and role designations often vary widely. As such, a single agreed definition of each may not always be practical or helpful when considering which key management option is most suited to an agency’s requirements.</p>]]></paragraph>
<paragraph
    title="17.9.6."


><![CDATA[<p>When considering key management options agencies need to consider the ownership, control, and possession aspects relating to cryptographic keys, and how these may impact security and business outcomes.</p>]]></paragraph>
</block>
<block title="Applicability for cryptographic systems"><paragraph
    title="17.9.7."


><![CDATA[<p>In general, the requirements specified in the NZISM apply equally to cryptographic systems. &nbsp;Where the requirements for cryptographic systems are different, the variations are contained in this section, and take precedence over requirements specified elsewhere in the NZISM.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="17.9.8."


><![CDATA[<p>Encryption is an unparalleled technology for the protection of information, but it relies on the strength of the algorithm, the strength of the key and, most importantly, strong key management.</p>]]></paragraph>
<paragraph
    title="17.9.9."


><![CDATA[<p>All encryption has four important characteristics:</p>
<ul>
<li>the value of the data to be protected and the level of protection required to protect it,</li>
<li>the algorithm used to encrypt the data,</li>
<li>the protocol used to apply the algorithm, and</li>
<li>the encryption key.</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.10."


><![CDATA[<p>In almost all cases the algorithm is in the public domain and is not a secret. &nbsp;When an encryption algorithm is publicly available, security rests entirely on the secrecy of the encryption key. &nbsp;It is also true that the effectiveness of most encryption systems depends on the secrecy of the encryption key. &nbsp;Approved Cryptographic Algorithms are described in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">Section 17.2</a>. and Approved Cryptographic Protocols (applying the algorithms) are described in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3</a>. &nbsp;These sections also specify key strengths to resist attempts to compromise the key through cryptanalysis.</p>]]></paragraph>
<paragraph
    title="17.9.11."


><![CDATA[<p>While any algorithm can, theoretically, be broken through cryptanalysis, this may require the use of vast computing power and other resources, making this approach infeasible. &nbsp;If, however, the encryption key is compromised, there is no need to attack the algorithm itself. &nbsp;Attacks on encryption systems will likely target the weakest point, most frequently these are the safeguards that are used to protection the key. &nbsp;Attempts to compromise keys and key management are more likely and more efficient than attacks on the algorithm itself. &nbsp;This is why strong key management is vital in order to protect the encryption key and keep the key secure and secret. &nbsp;When key management fails, cryptographic security is compromised.</p>]]></paragraph>
<paragraph
    title="17.9.12."


><![CDATA[<p>Almost all internet security protocols use cryptography for authentication, integrity, confidentiality, and non-repudiation. It is vital that good key management is implemented if these security protocols are to be protected, considered reliable, and provide required levels of assurance to organisations and users.</p>]]></paragraph>
<paragraph
    title="17.9.13."


><![CDATA[<p>In some cases, trusted third-party key management service providers furnish assistance to agencies in the generation, storage, operation, management, and retirement of keys associated with the agency.</p>]]></paragraph>
</block>
<block title="Key management"><paragraph
    title="17.9.14."


><![CDATA[<p>For encryption to be used effectively, the encryption keys must be managed and protected with the same care and security as the data originally encrypted, as long as the same key is being used to decrypt or recover data.&nbsp;</p>]]></paragraph>
<paragraph
    title="17.9.15."


><![CDATA[<p>Key management encompasses the operations and tasks necessary to create, protect, and control the use of cryptographic keys. &nbsp;The process from creation to destruction of the encryption key is described as the key management life cycle.</p>]]></paragraph>
</block>
<block title="Key management life cycle"><paragraph
    title="17.9.16."


><![CDATA[<p>The key management lifecycle covers:</p>
<ul>
<li>key generation,</li>
<li>key registration,</li>
<li>secure key storage,</li>
<li>key distribution and installation,</li>
<li>key use,</li>
<li>key rotation,</li>
<li>key backup (operational, backup and archive),</li>
<li>key replacement and reissue,</li>
<li>key recovery,</li>
<li>key revocation,</li>
<li>key suspension,&nbsp;</li>
<li>key retirement, and</li>
<li>key destruction.</li>
</ul>]]></paragraph>
</block>
<block title="Open networks"><paragraph
    title="17.9.17."


><![CDATA[<p>Open networks, by definition, seek to establish arbitrary connections without there necessarily being a pre-existing relationship. &nbsp;Protocols have been developed to manage this requirement through key exchange protocols and through trusted agents, most often a National Authority or Certificate Authority. &nbsp;Again it is important that approved protocols and algorithms, as specified in this document, are used. Refer to sections <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15853">17.2 Approved Cryptographic Algorithms</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">17.3 Approved Cryptographic Protocols</a>.</p>]]></paragraph>
</block>
<block title="Public key infrastructure"><paragraph
    title="17.9.18."


><![CDATA[<p>Public key infrastructure (PKI) is the system used to create, issue, manage, and revoke digital certificates and their associated cryptographic keys. PKI has many different applications, and typically is used for encrypting and digitally signing data in order to authenticate and protect data in transmission, and supporting confidentiality and privacy.&nbsp; It is used extensively in ecommerce, internet banking, and secure email as well as being a key element in protecting website traffic.<strong><br></strong></p>]]></paragraph>
</block>
<block title="Outsourcing key management"><paragraph
    title="17.9.19."


><![CDATA[<p>The goal of key management, both for use within an organisation or in the cloud, is to enable data encryption by securing access to cryptographic keys. This includes using a combination of cryptography and secure hardware to generate keys securely, to manage access and destruction of keys.&nbsp;</p>]]></paragraph>
<paragraph
    title="17.9.20."


><![CDATA[<p>As stated previously, the ownership, control, and possession are three key aspects relevant to key management. Understanding the differences between them will assist evaluating different key managements that meet an agency’s requirements.&nbsp;</p>]]></paragraph>
<paragraph
    title="17.9.21."


><![CDATA[<p>For the purpose of this section these are defined as follows:&nbsp;</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td>Ownership</td>
<td>
<p>Specifies to whom the cryptographic keys belong. This is usually the custodian. Ownership of the key applies to the owner of the encrypted data, the owner of the encryption and/or decryption process, and the owner of the key infrastructure.</p>
</td>
</tr>
<tr>
<td style="width: 6.14364%;">Control&nbsp;</td>
<td style="width: 63.3271%;" width="304">
<p>Specifies who carries out key management lifecycle tasks, including having the option of precluding others from doing these tasks.</p>
</td>
</tr>
<tr>
<td style="width: 6.14364%;">Possession&nbsp;</td>
<td style="width: 63.3271%;" width="110">
<p>Specifies ownership of the infrastructure or location where the keys and encrypted data physically reside.</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="17.9.22."


><![CDATA[<p>The following diagram depicts the relationship between ownership, possession, and control aspects within the key management process, including the likely points within it, where the aspects would be positioned. Subsequent paragraphs expand on these concepts by applying them to specific scenarios.&nbsp;</p>
<p><img width="600" height="351" alt="" src="/assets/NZISM/17__ResizedImageWzYwMCwzNTFd.9.22-Key-Management-relationship.png" loading="lazy" class="center ss-htmleditorfield-file image">

</p>]]></paragraph>
</block>
<block title="Commonly used key management scenarios "><paragraph
    title="17.9.23."


><![CDATA[<p>Within industry a number of&nbsp;approaches are available to manage end users’ cryptographic keys. There are variations in how these may be defined, therefore an awareness around how role attribution is allocated within a provider’s own key management offering is an important consideration when deciding on a solution.&nbsp;</p>
<p><strong>Example 1:</strong> The provider generates, manages, and stores the encryption and decryption keys. This option may reduce the amount of overhead an agency outlays compared to if they maintain their own key infrastructure. However, if an agency changes providers this may present challenges around compatibility, as well as financial implications.&nbsp;</p>
<p><img width="436" height="265" alt="" src="/assets/NZISM/17.9.23-Key-Management-Example-1.png" loading="lazy" class="ss-htmleditorfield-file image">

</p>
<p><strong>Example 2:</strong> The customer generates and manages encryption keys, and the cloud provider can access the keys to encrypt and decrypt the customer’s data. This option may reduce the level of control an agency has over the confidentiality of their data. A key consideration for choosing this option is likely to be the sensitivity of the data to be stored.&nbsp;</p>
<p><img width="424" height="206" alt="" src="/assets/NZISM/17.9.23-Key-Management-Example-2.png" loading="lazy" class="center ss-htmleditorfield-file image">

</p>
<p><strong>Example 3:</strong> An Agency generates and manages encryption keys including its storage. Data encryption occurs prior to movement into a cloud environment. The provider does not have access to file content. This option may be more suitable for agencies that require greater security around sensitive data. The cloud environment is used for storing the customer’s encrypted data.&nbsp;</p>
<p><img width="434" height="177" alt="" src="/assets/NZISM/17.9.23-Key-Management-Example-3.png" loading="lazy" class="center ss-htmleditorfield-file image">

</p>]]></paragraph>
<paragraph
    title="17.9.24."


><![CDATA[<p>The following includes considerations that should form part of a technical evaluation when deciding on a key management solution.&nbsp;</p>
<ul>
<li>The value of data to be stored including protection requirements for that data.&nbsp;</li>
<li>Whether the key management solution can be integrated with other data storage services.&nbsp;</li>
<li>The number and types of keys required to secure data and whether a provider can meet these expectations.&nbsp;</li>
<li>Whether an externally generated key provides sufficient assurance than if the key was generated using on premises infrastructure.&nbsp;</li>
<li>Whether keys can be automatically rotated.&nbsp;</li>
<li>The level of investment, resourcing, and technology required to support and maintain a key management infrastructure.&nbsp;</li>
<li>Whether a provider’s key revocation process adequately meets agencies’ expectations around the removal of access to data.&nbsp;</li>
</ul>]]></paragraph>
</block>
<block title="Risks"><paragraph
    title="17.9.25."


><![CDATA[<p>There are a number of specific risks related to the management of cryptographic keys. These include:</p>
<ul>
<li>Keys exposed to unauthorised persons or applications, potentially compromising the keys or data the encryption is protecting.</li>
<li>Lost or unrecoverable cryptographic keys.</li>
<li>Software based key management, which provides only limited protection.</li>
<li>Fragmented key management as new systems are introduced such as when changes occur to the physical custody of hardware outside of a trusted environment.&nbsp;</li>
<li>Poorly documented and understood key management processes and activities increasing the possibility of compromise and potentially increasing compliance costs.</li>
<li>Inadequate separation of duties within the ownership, control, and possession of keys, resulting in non-compatible duties being allocated to the same party, potentially resulting in unauthorised access of tenancy data.&nbsp;</li>
<li>Lack of interoperability if an agency’s key management infrastructure is not compatible with that offered by a cloud service provider.</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.26."


><![CDATA[<p>Several factors should be understood and assessed conjointly to enable decisions on which key management option is most suitable for security and business requirements. These factors include:&nbsp;</p>
<ul>
<li>scenario,&nbsp;</li>
<li>consideration,&nbsp;</li>
<li>risk,&nbsp;</li>
<li>business and/or security priority, and&nbsp;</li>
<li>outsource aspect.&nbsp;</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.27."


><![CDATA[<p>The following table provides an example of how the factors listed above can be considered collectively when undertaking a technical evaluation. It may also be useful when developing key or risk management plans. It is not intended to be definitive, but rather to assist agencies evaluate different key management options.&nbsp;</p>
<table width="0">
<tbody>
<tr>
<td width="136">
<p><strong>Scenario&nbsp;</strong></p>
</td>
<td width="145">
<p><strong>Consideration&nbsp;</strong></p>
</td>
<td width="137">
<p><strong>Risk&nbsp;</strong></p>
</td>
<td width="147">
<p><strong>Security and/or business priority&nbsp;</strong></p>
</td>
<td width="132">
<p><strong>Outsource aspect&nbsp;</strong></p>
</td>
</tr>
<tr>
<td width="136">
<p>Agency generated and management of encryption keys including its storage.&nbsp;</p>
</td>
<td width="145">
<p>Inadequate separation of duties within the ownership, control, and possession of keys, resulting in non-compatible duties being allocated to the same party, potentially resulting in unauthorised access of tenancy data.&nbsp;</p>
</td>
<td width="137">
<p>Keys exposed to unauthorised persons or applications, potentially compromising the keys or data the encryption is protecting.&nbsp;</p>
</td>
<td width="147">
<p>Sensitivity and value of the data. This is summarised by the classification of the data but may not always reflect the values of aggregation, cost of compliance breaches, or reputation damage from a breach.&nbsp;</p>
</td>
<td width="132">
<p>Control&nbsp;</p>
</td>
</tr>
<tr>
<td width="136">
<p>Agency generates the key, and it is migrated to a cloud where the provider can use the keys to perform encryption and decryption operations.&nbsp;</p>
</td>
<td width="145">
<p>Whether the key management solution can be integrated with other data storage services.&nbsp;</p>
</td>
<td width="137">
<p>Lack of interoperability if an agency’s key management infrastructure is not compatible with that offered by a cloud service provider.&nbsp;</p>
</td>
<td width="147">
<p>The variety of key types, data formats, algorithms, protocols, and sources.&nbsp;</p>
</td>
<td width="132">
<p>Possession&nbsp;</p>
</td>
</tr>
<tr>
<td width="136">
<p>Cloud provider generates, manages, and stores keys used to encrypt and decrypt data.&nbsp;</p>
</td>
<td width="145">
<p>Whether an externally generated key provides sufficient assurance than if the key was generated using on premises infrastructure.&nbsp;</p>
</td>
<td width="137">
<p>Poorly documented and understood key management processes and activities increasing the possibility of compromise and potentially increasing compliance costs.&nbsp;</p>
</td>
<td width="147">
<p>Sensitivity and value of the data. This is summarised by the classification of the data but may not always reflect the value of aggregation, cost of compliance, breaches, or reputation damage from a breach.&nbsp;</p>
</td>
<td width="132">
<p>Ownership&nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Prioritisation"><paragraph
    title="17.9.28."


><![CDATA[<p>Prioritisation helps identify and manage requirements for the use and management of cryptography and key management systems. This will determine the extent and complexity of the key management programme. Important aspects to consider are:</p>
<ul>
<li>Sensitivity and value of the data. This is summarised by the classification of the data but may not always reflect the values of aggregation, cost of compliance breaches or reputation damage from a breach.</li>
<li>The volume of data and keys.</li>
<li>The variety of key types, data formats, algorithms, protocols and sources.</li>
<li>The speed and frequency of transactions, requirements for data access and availability.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.9.29."


><![CDATA[<p>Further information on key management can be found in the following references:</p>
<table class="table-main" style="width: 833px; height: 734px;">
<tbody>
<tr style="height: 17px;">
<td style="width: 212.262px; height: 17px;"><strong>Title</strong></td>
<td style="width: 111.1px; height: 17px;"><strong>Publisher</strong></td>
<td style="width: 490.837px; height: 17px;"><strong>Description and source</strong></td>
</tr>
<tr style="height: 109px;">
<td style="width: 212.262px; height: 109px;">Common key management system models for the cloud</td>
<td style="width: 111.1px; height: 109px;">
<p>CRYPTOMATHIC</p>
</td>
<td style="width: 490.837px; height: 109px;">
<p>Explains the four primary cloud KMS pattern combinations, and their suitability depending on an organisation’s requirements.</p>
<p><a href="https://www.cryptomathic.com/news-events/blog/common-key-management-system-models-for-the-cloud">Common Key Management System Models for the Cloud (cryptomathic.com)</a></p>
</td>
</tr>
<tr style="height: 114px;">
<td style="width: 212.262px; height: 114px;">
<p>Options for key management in the cloud</p>
</td>
<td style="text-align: center; width: 111.1px; height: 114px;">CSA</td>
<td style="width: 490.837px; height: 114px;">
<p>Provides guidance and description around different key management patterns.</p>
<a href="https://cloudsecurityalliance.org/blog/2022/03/24/ownership-control-and-possession-options-for-key-management-in-the-cloud/">https://cloudsecurityalliance.org/blog/2022/03/24/ownership-control-and-possession-options-for-key-management-in-the-cloud/</a></td>
</tr>
<tr style="height: 96px;">
<td style="width: 212.262px; height: 96px;">Choosing and configuring a KMS for secure key management in the cloud</td>
<td style="width: 111.1px; height: 96px;">
<p class="text-center">NCSC/UK</p>
</td>
<td style="width: 490.837px; height: 96px;"><a title="Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle" rel="noopener noreferrer" href="https://www.iso.org/standard/39666.html" target="_blank"></a>
<p>How to choose, use, and configure cloud services safely and what security risks need to be considered.</p>
<a href="https://www.ncsc.gov.uk/collection/cloud/understanding-cloud-services/choosing-and-configuring-a-kms-for-secure-key-management-in-the-cloud">Choosing and configuring a KMS for secure key management... - NCSC.GOV.UK</a><a title="Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle" rel="noopener noreferrer" href="https://www.iso.org/standard/39666.html" target="_blank"></a></td>
</tr>
<tr style="height: 115px;">
<td style="width: 212.262px; height: 115px;">
<p>ISO/IEC 11770</p>
Information Technology – Security Techniques – Key Management</td>
<td style="text-align: center; width: 111.1px; height: 115px;">ISO / IEC</td>
<td style="width: 490.837px; height: 115px;"><a href="https://www.iso.org/standard/53456.html">ISO/IEC 11770-1:2010 - Information technology — Security techniques — Key management — Part 1: Framework</a></td>
</tr>
<tr style="height: 78px;">
<td style="width: 212.262px; height: 78px;">
<p>Guidelines for Cryptographic Key Management</p>
</td>
<td style="text-align: center; width: 111.1px; height: 78px;">
<p>IETF</p>
</td>
<td style="width: 490.837px; height: 78px;"><a href="https://datatracker.ietf.org/doc/rfc4107/">RFC 4107 - Guidelines for Cryptographic Key Management (ietf.org)</a></td>
</tr>
<tr style="height: 78px;">
<td style="width: 212.262px; height: 78px;">
<p>Key management and key establishment</p>
</td>
<td style="text-align: center; width: 111.1px; height: 78px;">
<p>NIST</p>
</td>
<td style="width: 490.837px; height: 78px;">
<p><a href="https://csrc.nist.gov/Projects/Key-Management/Key-Management-Guidelines">Key Management | CSRC (nist.gov)</a></p>
</td>
</tr>
<tr style="height: 95px;">
<td style="width: 212.262px; height: 95px;">
<p>Key management interoperability specification and profile</p>
</td>
<td style="text-align: center; width: 111.1px; height: 95px;">OASIS</td>
<td style="width: 490.837px; height: 95px;"><a href="https://www.oasis-open.org/2020/12/18/key-management-interoperability-protocol-specification-and-key-management-interoperability-protocol-profiles-oasis-standards-published/">Key Management Interoperability Protocol Specification and Key Management Interoperability Protocol Profiles OASIS Standards published - OASIS Open (oasis-open.org)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Developing key management plans"><paragraph
    title="17.9.30.R.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


><![CDATA[<p>Most modern cryptographic systems are designed to be highly resistant to cryptographic analysis, and it should be assumed that a determined attacker could obtain details of the cryptographic logic. Cryptographic system material is safeguarded by implementing a key management plan (KMP) encompassing personnel, physical, and information security.</p>]]></paragraph>
<paragraph
    title="17.9.30.R.02."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


><![CDATA[<p>Depending on the security requirements of an agency, different key management models or combination of models may be adopted to allocate the ownership, control, and possession for keys. It should be noted that the greater the sharing model adopted the less control of keys an agency may have.</p>]]></paragraph>
<paragraph
    title="17.9.30.C.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3016"
><![CDATA[<p>Agencies SHOULD assess the risks associated around key ownership, possession, and control against their own security and business requirements.</p>]]></paragraph>
<paragraph
    title="17.9.30.C.02."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3018"
><![CDATA[<p>Agencies SHOULD develop a KMP when they have implemented a cryptographic system using commercial grade cryptographic equipment.</p>]]></paragraph>
<paragraph
    title="17.9.30.C.03."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3017"
><![CDATA[<p>The level of detail included in a KMP MUST be consistent with the criticality and classification of the information to be protected.</p>]]></paragraph>
</block>
<block title="Contents of key management plans"><paragraph
    title="17.9.31.R.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


><![CDATA[<p>When agencies implement the recommended contents for KMPs they will have a good starting point for the protection of cryptographic systems and their material within their agencies.</p>]]></paragraph>
<paragraph
    title="17.9.31.C.01."

    tags="Cryptography,Information Security Documentation,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3021"
><![CDATA[<p>The table below describes the minimum contents which SHOULD be documented in the KMP.</p>
<table class="table-main">
<tbody>
<tr>
<td>Topic&nbsp;</td>
<td>&nbsp;Content</td>
</tr>
<tr>
<td>Objectives</td>
<td>
<ul>
<li>Objectives of the cryptographic system and KMP, including organisational aims.</li>
<li>Refer to relevant NZCSIs.</li>
</ul>
</td>
</tr>
<tr>
<td>System description</td>
<td>
<ul>
<li>The environment.</li>
<li>Maximum classification of information protected.</li>
<li>Topology diagram(s) and description of the cryptographic system topology including data flows.</li>
<li>The use of keys.</li>
<li>Key algorithm.</li>
<li>Key length.</li>
<li>Key lifetime.</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Roles and administrative responsibilities</p>
</td>
<td>
<ul>
<li>Documents roles and responsibilities, including, if relevant, the COMSEC custodian, cryptographic systems administrator, record keeper, cloud service provider, and auditor.</li>
</ul>
</td>
</tr>
<tr>
<td>Accounting</td>
<td>
<ul>
<li>How accounting will be undertaken for the cryptographic system.</li>
<li>What records will be maintained.</li>
<li>How records will be audited.</li>
</ul>
</td>
</tr>
<tr>
<td>Classification</td>
<td>
<ul>
<li>Classification of the cryptographic system hardware.</li>
<li>Classification of cryptographic system software.</li>
<li>Classification of the cryptographic system documentation.</li>
</ul>
</td>
</tr>
<tr>
<td>Information security incidents</td>
<td>
<ul>
<li>A description of the conditions under which compromise of key material should be declared.</li>
<li>References to procedures to be followed when reporting and dealing with information security incidents.</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Key management</p>
</td>
<td>
<ul>
<li>Who generates keys.</li>
<li>How keys are delivered.</li>
<li>How keys are received.</li>
<li>Key distribution, including local, remote and central.</li>
<li>How keys are installed.</li>
<li>How keys are transferred.</li>
<li>How keys are stored.</li>
<li>How keys are recovered.</li>
<li>How keys are revoked.</li>
<li>How keys are destroyed.</li>
<li>Each time key information or material is accessed, details are captured in logs.</li>
<li>Approved access lists to cryptographic keys.&nbsp;</li>
</ul>
</td>
</tr>
<tr>
<td>Maintenance</td>
<td>
<ul>
<li>Maintaining the cryptographic system software and hardware.</li>
<li>Destroying equipment and media.</li>
</ul>
</td>
</tr>
<tr>
<td>References</td>
<td>
<ul>
<li>Vendor documentation.</li>
<li>Related policies.</li>
</ul>
</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Accounting"><paragraph
    title="17.9.32.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>As cryptographic equipment, and the keys they store, provide a significant security function for systems it is important that agencies are able to account for all cryptographic equipment.</p>]]></paragraph>
<paragraph
    title="17.9.32.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="Secret, Confidential, Top Secret"
    compliance="Must"
    cid="3024"
><![CDATA[<p>Agencies MUST be able to readily account for all transactions relating to cryptographic system material including identifying hardware and all software versions issued with the equipment and materials, including date and place of issue.</p>]]></paragraph>
<paragraph
    title="17.9.32.C.02."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3025"
><![CDATA[<p>Agencies SHOULD be able to readily account for all transactions relating to cryptographic system material including identifying hardware and all software versions issued with the equipment and materials, including date and place of issue.</p>]]></paragraph>
</block>
<block title="Audits, compliance and inventory checks"><paragraph
    title="17.9.33.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>Cryptographic system audits are used as a process to account for cryptographic equipment.</p>]]></paragraph>
<paragraph
    title="17.9.33.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3028"
><![CDATA[<p>Agencies MUST conduct audits using two personnel with cryptographic system administrator access.</p>]]></paragraph>
<paragraph
    title="17.9.33.C.02."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3029"
><![CDATA[<p>Agencies SHOULD conduct audits of cryptographic system material:</p>
<ul>
<li>on handover/takeover of administrative responsibility for the cryptographic system;</li>
<li>on change of personnel with access to the cryptographic system; and</li>
<li>at least annually.</li>
</ul>]]></paragraph>
<paragraph
    title="17.9.33.C.03."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3030"
><![CDATA[<p>Agencies SHOULD perform audits to:</p>
<ul>
<li>account for all cryptographic system material; and</li>
<li>confirm that agreed security measures documented in the KMP are being followed.</li>
</ul>]]></paragraph>
</block>
<block title="Access register"><paragraph
    title="17.9.34.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>Access registers can assist in documenting personnel that have privileged access to cryptographic systems along with previous accounting and audit activities for the system.</p>]]></paragraph>
<paragraph
    title="17.9.34.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3033"
><![CDATA[<p>Agencies MUST hold and maintain an access register that records cryptographic system information such as:</p>
<ul>
<li>details of personnel with system administrator access;</li>
<li>details of those whose system administrator access was withdrawn;</li>
<li>details of system documents;</li>
<li>accounting activities; and</li>
<li>audit activities.</li>
</ul>]]></paragraph>
</block>
<block title="Cryptographic system administrator access"><paragraph
    title="17.9.35.R.01."

    tags="Cryptography,Technical,Key Management"


><![CDATA[<p>The cryptographic system administrator is a highly privileged position which involves granting privileged access to a cryptographic system. &nbsp;Therefore extra precautions need to be put in place surrounding the security and vetting of the personnel as well as the access control procedures for individuals designated as cryptographic system administrators.</p>]]></paragraph>
<paragraph
    title="17.9.35.C.01."

    tags="Cryptography,Technical,Key Management"


    classification="All Classifications"
    compliance="Must"
    cid="3036"
><![CDATA[<p>Before personnel are granted cryptographic system administrator access, agencies MUST ensure that they have:</p>
<ul>
<li>a demonstrated need for access;</li>
<li>read and agreed to comply with the relevant Key Management Policy and Plan (KMP) for the cryptographic system they are using;</li>
<li>a security clearance at least equal to the highest classification of information processed by the cryptographic system;</li>
<li>agreed to protect the authentication information for the cryptographic system at the highest classification of information it secures;</li>
<li>agreed not to share authentication information for the cryptographic system without approval;</li>
<li>agreed to be responsible for all actions under their accounts;&nbsp;</li>
<li>agreed to report all potentially security related problems to the GCSB; and</li>
<li>ensure relevant staff have received appropriate training.</li>
</ul>]]></paragraph>
</block>
<block title="Area security and access control"><paragraph
    title="17.9.36.R.01."

    tags="Cryptography,Technical,Access Control,Key Management"


><![CDATA[<p>As cryptographic equipment contains particularly sensitive information additional physical security measures need to be applied to the equipment.</p>]]></paragraph>
<paragraph
    title="17.9.36.C.01."

    tags="Cryptography,Technical,Access Control,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3039"
><![CDATA[<p>Cryptographic system equipment SHOULD be stored in a room that meets the requirements for a server room of an appropriate level based on the classification of information the cryptographic system processes.</p>]]></paragraph>
<paragraph
    title="17.9.36.C.02."

    tags="Cryptography,Technical,Access Control,Key Management"


    classification="All Classifications"
    compliance="Should"
    cid="3040"
><![CDATA[<p>Areas in which cryptographic system material is used SHOULD be separated from other areas and designated as a controlled cryptography area.</p>]]></paragraph>
</block>
<block title="High assurance cryptographic equipment"><paragraph
    title="17.9.37.R.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


><![CDATA[<p>The NZCSI series of documents provide product specific policy for HACE.</p>]]></paragraph>
<paragraph
    title="17.9.37.C.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Must"
    cid="3043"
><![CDATA[<p>Agencies MUST comply with NZCSI when using HACE.</p>]]></paragraph>
</block>
<block title="Transporting commercial grade cryptographic equipment &amp; products"><paragraph
    title="17.9.38.R.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


><![CDATA[<p>Transporting commercial grade cryptographic equipment in a keyed state exposes the equipment to the potential for interception and compromise of the key stored within the equipment.&nbsp; When commercial grade cryptographic equipment is transported in a keyed state it needs to be done so according to the requirements for the classification of the key stored in the equipment.</p>]]></paragraph>
<paragraph
    title="17.9.38.C.01."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Must"
    cid="3048"
><![CDATA[<p>Unkeyed commercial grade cryptographic equipment MUST be distributed and managed by a means approved for the transportation and management of government property.</p>]]></paragraph>
<paragraph
    title="17.9.38.C.02."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Must"
    cid="3050"
><![CDATA[<p>Keyed commercial grade cryptographic equipment MUST be distributed, managed and stored by a means approved for the transportation and management of government property based on the classification of the key within the equipment.</p>]]></paragraph>
<paragraph
    title="17.9.38.C.03."

    tags="Cryptography,Technical,High Assurance Products,Key Management,HACE"


    classification="All Classifications"
    compliance="Should Not"
    cid="3053"
><![CDATA[<p>Agencies SHOULD NOT transport commercial grade cryptographic equipment or products in a keyed state.</p>]]></paragraph>
</block>
</subsection>
</section>
