Adversaries may try to gather information about Key Management Policy implemented. Security Policies are rules and regulations that describe the operational procedures required for proper key management. This includes the specification of rules for processes such as generation, distribution, and allowed use for cryptographic keys. [1]
Standard/references: [2]
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.