Skip to main content

CCC.Core.C11: Protect Encryption Keys

Control ID:CCC.Core.C11
Title:Protect Encryption Keys
Objective:Ensure that encryption keys are managed securely by enforcing the use of approved algorithms, regular key rotation, and customer-managed encryption keys (CMEKs).
Control Family:
Data

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH16Publications are DisabledPublication of events, metrics, and runtime logs may be disabled, leading to a lack of expected security and operational information being shared. This can impact system availability by delaying the detection of incidents while also impacting system design decisions and enforcement of operational thresholds, such as autoscaling or cost management.
1
1
0

Related Capabilities

IDTitleDescription
CCC.Core.F10Log PublicationThe service automatically publishes structured, verbose records of activities, operations, or events that occur within the service.
CCC.Core.F09Metrics PublicationThe service automatically publishes structured, numeric, time-series data points related to the performance, availability, and health of the service or its child resources.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.DS-1
0
-
CCM
CEK-08
3
CSC Key Management Capability (must provide the capability to self-manage keys)
CCM
CEK-10
10
Key Generation (using industry accepted cryptographic libraries)
CCM
CEK-12
10
Key Rotation
ISO_27001
2013 A.10.1.2
0
-
NIST_800_53
SC-12
0
-
NIST_800_53
SC-17
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.Core.C11.TR01When encryption keys are used, the service MUST verify that all encryption keys use the latest industry-standard cryptographic algorithms.
tlp-amber
tlp-red
CCC.Core.C11.TR02When encryption keys are used, the service MUST rotate active keys within 180 days of issuance.
tlp-amber
CCC.Core.C11.TR03When encrypting data, the service MUST verify that customer-managed encryption keys (CMEKs) are used.
tlp-amber
tlp-red
CCC.Core.C11.TR04When encryption keys are accessed, the service MUST verify that access to encryption keys is restricted to authorized personnel and services, following the principle of least privilege.
tlp-clear
tlp-green
tlp-amber
tlp-red
CCC.Core.C11.TR05When encryption keys are used, the service MUST rotate active keys within 365 days of issuance.
tlp-clear
tlp-green
CCC.Core.C11.TR06When encryption keys are used, the service MUST rotate active keys within 90 days of issuance.
tlp-red