An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
81/172
)
CCIs
Number
Definition
Status
Related
CCI-002431
Defines the requirements for cryptographic key access to be employed within the system.
Draft
SC-12
CCI-002432
Defines the requirements for cryptographic key destruction to be employed within the system.
Draft
SC-12
CCI-002433
Establish cryptographic keys when cryptography is employed within the system in accordance with organization-defined requirements for key generation.
Draft
SC-12
CCI-002434
Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key distribution.
Draft
SC-12
CCI-002435
Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key storage.
Draft
SC-12
CCI-002436
Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key access.
Draft
SC-12
CCI-002437
Establish cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key destruction.
Draft
SC-12
CCI-002438
Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key generation.
Draft
SC-12
CCI-002439
Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key distribution.
Draft
SC-12
CCI-002440
Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key storage.
Draft
SC-12
CCI-002441
Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key access.
Draft
SC-12
CCI-002442
Manage cryptographic keys when cryptography employed within the system in accordance with organization-defined requirements for key destruction.
Draft
SC-12
CCI-002443
Produce symmetric cryptographic keys using NIST FIPS-validated or NSA-approved key management technology and processes.
Draft
SC-12(2)
CCI-002444
Control symmetric cryptographic keys using NIST FIPS-validated or NSA-approved key management technology and processes.
Draft
SC-12(2)
CCI-002445
Distribute symmetric cryptographic keys using NIST FIPS-validated or NSA-approved key management technology and processes.
Draft
SC-12(2)
CCI-002446
Produce asymmetric cryptographic keys using: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; or certificates issued in accordance with organization-defined requirements.
Draft
SC-12(3)
CCI-002447
Control asymmetric cryptographic keys using: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; or certificates issued in accordance with organization-defined requirements.
Draft
SC-12(3)
CCI-002448
Distribute asymmetric cryptographic keys using: NSA-approved key management technology and processes; prepositioned keying material; DoD-approved or DoD-issued Medium Assurance PKI certificates; DoD-approved or DoD-issued Medium Hardware Assurance PKI certificates and hardware security tokens that protect the user's private key; or certificates issued in accordance with organization-defined requirements.
Draft
SC-12(3)
CCI-002449
Defines the cryptographic uses, and type of cryptography required for each use, to be implemented by the system.
Draft
SC-13
CCI-002450
Implement organization-defined types of cryptography for each specified cryptography use.
Draft
SC-13
CCI-002451
Defines the systems or system components from which collaborative computing devices and applications in organization-defined secure work areas are to be disabled or removed.
Draft
SC-15(3)
CCI-002452
Defines the online meetings and teleconferences for which the system provides an explicit indication of current participants.
Draft
SC-15(4)
CCI-002453
Provide an explicit indication of current participants in organization-defined online meetings and teleconferences.
Draft
SC-15(4)
CCI-002454
Defines the security attributes to associate with the information being exchanged between systems and between system components.
Draft
SC-16
CCI-002455
Associate organization-defined security attributes with information exchanged between system components.
Draft
SC-16
CCI-002456
Defines the certificate policy employed to issue public key certificates.
Draft
SC-17
CCI-002457
Defines the corrective actions to be taken when organization-defined unacceptable mobile code is identified.
Draft
SC-18(1)
CCI-002458
Defines what constitutes unacceptable mobile code by using corrective actions.
Draft
SC-18(1)
CCI-002459
Defines the unacceptable mobile code to prevent download and execution.
Draft
SC-18(3)
CCI-002460
Enforce organization-defined actions prior to executing mobile code.
Draft
SC-18(4)
Prev
1...
77
78
79
80
81
82
83
84
85
...172
Next