HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.166 Provisions governing the use of crypto modules

S 2.166 Provisions governing the use of crypto modules

Initiation responsibility: IT Security Management

Implementation responsibility: IT Security Management

A range of security requirements on the use of crypto modules also has to be imposed in the course of ongoing operation. These must be appropriately integrated into the technical and organisational environment in which they are used.

To achieve this, certain organisational regulations have to be put in place:

Reliable, secure operation of the crypto modules must be ensured; this includes:

Various specifications also have to be laid down in relation to key management (see S 2.46 Appropriate key management):

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home