Implement robust physical security measures to protect and isolate root cryptographic keys. This includes secure hardware modules, tamper-evident seals, and physical segregation within spacecraft or ground facilities to ensure that keys remain secure during storage, generation, and use.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| T2013 | Key Management Infrastructure Manipulation | |||