SKIP TO PAGE CONTENT

SC-12 Cryptographic Key Establishment and Management

Last Review: 3/11/20

Statement

WTAMU establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

When cryptography is required and employed within the University information system(s), the University establishes and manages cryptographic keys using automated mechanisms with supporting procedures or manual procedures. Cryptographic keys managed by the University will be done in a manner to protect keys from disclosure, including proper storage access controls, exchange, and destruction

Phone
Twitter
Facebook
Instagram
Mail