HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 2.19 Inadequate key management for encryption

T 2.19 Inadequate key management for encryption

If cryptographic systems are used for protecting the confidentiality of data to be transferred, inadequate key management can undermine the required protection if:

Examples:

However, it is not only the disclosure but also the loss of cryptographic keys that can cause substantial problems. Cryptographic keys can

If keys are no longer available, data protected by them can no longer be decrypted or tested for its authenticity.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home