SC-28(3)
SC-28(3): Cryptographic Keys
Provide protected storage for cryptographic keys [one of "{{ insert: param, sc-28.03_odp.02 }} "/"hardware-protected key store"].
Supplemental
A Trusted Platform Module (TPM) is an example of a hardware-protected data store that can be used to protect cryptographic keys.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline, Privacy (high), Privacy (moderate) |
| CSF Categories |
|---|
| None |