CMMC 1.0 Practice SC.3.187 Requirement:

Establish and manage cryptographic keys for cryptography employed in organizational systems.

CMMC 1.0 SC.3.187 Requirement Explanation:

Cryptographic key management system provide for the management of cryptographic keys including generation, distribution, storage, backup, archive, recovery, use, revocation, and destruction. Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates.

Example CMMC 1.0 SC.3.187 Implementation:

Examples of cryptographic keys include SSH keys, PGP keys, and digital certificates. Create an inventory of your cryptographic keys and determine who is responsible for which keys. Create a policy covering the life cycle of your encryption keys. Use a key management system to protect cryptographic keys. If you do not have many keys, you can accomplish this manually.

CMMC 1.0 SC.3.187 Scenario(s):

- Scenario 1:

Your company uses SSH keys to access its server and network devices. To prevent an attacker from accessing the keys you use a key management system and have a robust key management policy. In accordance with your policy, new keys are generated every few months. Only authorized individuals are provided the keys. They are not allowed to provide it to others. Your policy states that keys must stored in an encrypted format. Your key management system handles the distribution storage, backup, use, revocation, and destruction of keys. This is more efficient than a manual process.

Discover Our NIST SP 800-171 & CMMC 2.0 Solutions:


Compliance Accelerator

Power through compliance. Meet and maintain your NIST SP 800-171 & CMMC 2.0 compliance requirements.

Quantum Assessor

Transform your business. Create new revenue streams and provide scalability for your NIST SP 800-171 and CMMC 2.0 services.

Supply Chain Verifier

Trust is everything. Verify, monitor, and support subcontactor compliance.