Secure and isolate key management facilities to prevent unauthorized access or tampering with cryptographic keys. This involves employing physical security controls (e.g., restricted areas, surveillance), logical access controls, and network segmentation to ensure that key generation, storage, and distribution processes remain uncompromised.
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| T2015 | Retrieve TT&C master/session keys | |||