Which of the following is required by key management procedures to prevent unauthorized substitution of cryptographic keys?

Prepare for the PCI DSS Requirements Test with our interactive quizzes. Use multiple choice questions, flashcards, and detailed explanations. Ace your exam with confidence!

Multiple Choice

Which of the following is required by key management procedures to prevent unauthorized substitution of cryptographic keys?

Explanation:
Preventing unauthorized substitution of cryptographic keys requires explicit processes in key management procedures. These procedures define how keys are created, stored, distributed, rotated, and retired, and they incorporate controls like dual control and separation of duties, key versioning and inventory management, protection of cryptographic modules, formal change management with approvals, and comprehensive logging and monitoring. Together, these measures ensure that no one can substitute a key or introduce an untrusted key without detection. Merely relying on periodic audits or focusing only on physical security doesn’t directly prevent substitutions in real time, and insisting on no rotation ignores the need to refresh and revoke compromised keys.

Preventing unauthorized substitution of cryptographic keys requires explicit processes in key management procedures. These procedures define how keys are created, stored, distributed, rotated, and retired, and they incorporate controls like dual control and separation of duties, key versioning and inventory management, protection of cryptographic modules, formal change management with approvals, and comprehensive logging and monitoring. Together, these measures ensure that no one can substitute a key or introduce an untrusted key without detection. Merely relying on periodic audits or focusing only on physical security doesn’t directly prevent substitutions in real time, and insisting on no rotation ignores the need to refresh and revoke compromised keys.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy