| Process Area |
Process Description |
Process Requirements |
| Key Generation |
Secure creation of keys (symmetric encryption) or key pairs (asymmetric encryption). |
- Keys must be created using cryptographically strong algorithms (see Cryptographic Requirements above).
|
| Key Distribution |
Secure distribution of keys using manual transport methods (e.g. file transfer, key loaders), automated methods (e.g. Key transport and/or Key agreement protocols), or a combination thereof. |
- Keys must be encrypted when transmitted over communication lines.
- The exchange of keys must employ encryption using an algorithm that is at least as strong as the one that is used to encrypt the data protected by the keys, and access must be strictly limited to those who have a need-to-know.
|
| Key Storage and Protection |
Protect all cryptographic keys against modification, loss and destruction. |
- Keys and their associated software products must be securely maintained for the life of the archived data that was encrypted with that product.
- Keys must be protected using the same or superior level of security as the information that they are protecting, and access must be strictly limited to those who have a need-to-know.
- In public-private key encryption, private keys need protection against unauthorized disclosure.
- Keys must not be stored on the same storage media as the encrypted data.
- Equipment used to generate, store and archive keys must be physically protected.
|
| Key Recovery |
To prevent data loss, establish processes to ensure Keys can be recovered if they are forgotten. |
- Strategies must be implemented to enable Key recovery.
- UBC's central Key Escrow service is recommended for this purpose because it is reliable and secure. See the Key Escrow guideline for more information.
- Alternatively, the Key may be recorded on a piece of paper and locked in a secure location such as a safe.
- The recovery process must be documented to assure it will be effective when required.
|
| Key Change |
Revoke and publish new keys when they are suspected of compromise or unauthorized disclosure, they reach the end of their lifetime, and/or the key owner or delegated individual leaves the employ of UBC. |
- Key lifespan must be documented along with processes and rules for making changes to keys.
- Clear authorization process for key changes.
- Specific responses to suspected compromised keys.
|