Protect/isolate Key Mangement Facility

Secure and isolate key management facilities to prevent unauthorized access or tampering with cryptographic keys. This involves employing physical security controls (e.g., restricted areas, surveillance), logical access controls, and network segmentation to ensure that key generation, storage, and distribution processes remain uncompromised.

ID: M2074
Version: 1.2
Created: 21 April 2023
Last Modified: 02 December 2024

Techniques Addressed by Mitigation