Define, implement and evaluate processes, procedures and technical measures to deactivate keys at the time of their expiration date, which include provisions for legal and regulatory requirements.
Deactivated keys should not be used to encrypt but can be used to decrypt.
- Upon the expiration date, keys should not be able to encrypt data.
- The deactivated state should transition to the destroyed state when keys are no longer needed.
- Metadata should be retained for audit purposes.
- All relevant transitions/activity should be recorded (logged) in the inventory management system (CKMS).
- Confirm the existence of processes and procedures to deactivate keys.
- Review the access and permissions around the key deactivation process and confirm this is restricted to appropriate individuals.
- Review key deactivation process and configurations. Confirm that they are in line with internal and external requirements.
- Confirm the key deactivation process e.g. manual, on expiration, at a defined future time.
[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]
Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.