Ensure that cryptographic mechanisms used to provide the following controls are under configuration management: [controls provided by cryptographic mechanisms that are to be under configuration management are defined;].
Supplemental
The controls referenced in the control enhancement refer to security and privacy controls from the control catalog. Regardless of the cryptographic mechanisms employed, processes and procedures are in place to manage those mechanisms. For example, if system components use certificates for identification and authentication, a process is implemented to address the expiration of those certificates.