Skip to main content

Cryptographic Key Management Template

This Cryptographic Key Management Plan is designed to ensure compliance with the New Zealand Information Security Manual (NZISM) requirements. It outlines the procedures for generating, distributing, storing, using, and retiring encryption keys to protect sensitive information. This plan is tailored for specific client requirements.

1. Introduction

The purpose of this plan is to define the policies and procedures for managing encryption keys to ensure the confidentiality, integrity, and availability of sensitive data in compliance with NZISM.

2. Key Management Roles and Responsibilities

Key Management Authority (KMA): Responsible for overseeing the entire key management process, including policy enforcement and auditing.

Key Custodians: Individuals responsible for the generation, distribution, storage, and destruction of encryption keys.

System Administrators: Manage the systems that utilize encryption keys and ensure their secure configuration.

Security Officers: Monitor and audit the key management process to ensure compliance with NZISM.

3. Key Management Lifecycle

3.1 Key Generation

  • Procedure: Encryption keys must be generated using a FIPS 140-2 Level 3 certified Hardware Security Module (HSM) or equivalent.

  • Key Strength: Keys must meet or exceed the recommended key strength requirements specified in NZISM (e.g., AES-256 for symmetric keys, RSA-2048 for asymmetric keys).

3.2 Key Distribution

  • Secure Channels: Keys must be distributed using secure channels, such as encrypted emails or physical transfer in tamper-evident packaging.

  • Access Control: Only authorized personnel should have access to encryption keys during distribution.

3.3 Key Storage

  • HSMs: Encryption keys should be stored in FIPS 140-2 Level 3 certified HSMs.

  • Backup: Secure backups of encryption keys must be maintained in separate, secure locations to ensure availability.

  • Physical Security: Physical access to key storage locations must be restricted and monitored.

3.4 Key Usage

  • Access Control: Access to encryption keys should be restricted to authorized applications and personnel only.

  • Logging: All key usage activities must be logged for auditing and monitoring purposes.

  • Rotation: Keys must be rotated regularly as per NZISM guidelines or when there is a suspicion of compromise.

3.5 Key Archiving and Destruction

  • Archiving: Retired keys must be archived securely for a period specified by NZISM requirements for auditing and legal purposes.

  • Destruction: Encryption keys that are no longer needed must be destroyed using methods that ensure they cannot be recovered (e.g., zeroization in HSMs).

4. Key Management Policies

4.1 Access Control

  • Role-Based Access: Implement role-based access controls (RBAC) to restrict access to encryption keys based on job responsibilities.

  • Multi-Factor Authentication: Use multi-factor authentication (MFA) for accessing key management systems.

4.2 Monitoring and Auditing

  • Continuous Monitoring: Implement continuous monitoring of key management activities to detect unauthorized access or anomalies.

  • Regular Audits: Conduct regular audits of the key management process to ensure compliance with NZISM requirements.

4.3 Incident Response

  • Compromise Handling: Define and document procedures for responding to suspected or confirmed key compromises.

  • Key Revocation: Establish procedures for the revocation and replacement of compromised keys.

5. Training and Awareness

  • Regular Training: Provide regular training to all personnel involved in key management on the policies, procedures, and best practices.

  • Awareness Programs: Conduct awareness programs to ensure all employees understand the importance of encryption key management and their roles in maintaining security.

6. Documentation and Review

  • Documentation: Maintain comprehensive documentation of all key management policies, procedures, and activities.

  • Regular Review: Review and update the key management plan regularly to ensure it remains compliant with NZISM requirements and addresses emerging threats.

By following this Encryption Key Management Plan, we ensure that our encryption keys are managed securely and in compliance with NZISM requirements, protecting the confidentiality, integrity, and availability of sensitive data.