STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-12 (2)

System and Communications ProtectionRev 5organization

Symmetric Keys

Control Statement

Produce, control, and distribute symmetric cryptographic keys using [Selection: organization-defined value] key management technology and processes.

Supplemental Guidance

[SP 800-56A](#20957dbb-6a1e-40a2-b38a-66f67d33ac2e), [SP 800-56B](#0d083d8a-5cc6-46f1-8d79-3081d42bcb75) , and [SP 800-56C](#eef62b16-c796-4554-955c-505824135b8a) provide guidance on cryptographic key establishment schemes and key derivation methods. [SP 800-57-1](#110e26af-4765-49e1-8740-6750f83fcda1), [SP 800-57-2](#e7942589-e267-4a5a-a3d9-f39a7aae81f0) , and [SP 800-57-3](#8306620b-1920-4d73-8b21-12008528595f) provide guidance on cryptographic key management.

CCI Identifiers (4)

CCI-001140The organization produces, controls, and distributes symmetric cryptographic keys using NIST-approved or NSA-approved key management technology and processes.CCI-002443Produce symmetric cryptographic keys using NIST FIPS-validated or NSA-approved key management technology and processes.CCI-002444Control symmetric cryptographic keys using NIST FIPS-validated or NSA-approved key management technology and processes.CCI-002445Distribute symmetric cryptographic keys using NIST FIPS-validated or NSA-approved key management technology and processes.

Linked STIG Checks (2)

Across 2 STIGs. Click to expand.