This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Key Management Cheat Sheet"
(→Algorithm Selection) |
(→Algorithm Selection) |
||
Line 15: | Line 15: | ||
<th> Application objective </th> | <th> Application objective </th> | ||
</tr> | </tr> | ||
+ | </table> | ||
+ | |||
+ | |||
+ | <table> | ||
+ | <tr> | ||
+ | <th>Month</th> | ||
+ | <th>Savings</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td>January</td> | ||
+ | <td>$100</td> | ||
+ | </tr> | ||
</table> | </table> | ||
Revision as of 21:05, 15 April 2015
- 1 DRAFT CHEAT SHEET - WORK IN PROGRESS
- 2 Introduction
- 3 Key Management General Guidelines and Considerations
- 4 Key Management Lifecycle Best Practices
- 5 Trust Stores
- 6 Cryptographic Module Topics
- 7 Standards
- 8 Cryptographic Key Management Libraries
- 9 Authors and Primary Editors
- 10 Other Cheatsheets
DRAFT CHEAT SHEET - WORK IN PROGRESS
Introduction
This Key Management Cheat Sheet provides developers with guidance for implementation of cryptographic key management within application in a secure manner.
Key Management General Guidelines and Considerations
Algorithm Selection
Selection of the cryptographic and key management algorithms to use within a given application should begin with an understanding of the objectives of the application. For example, if the application is required to store data securely, then the developer should select an algorithm suite that supports the objective of Data-At-Rest (DAR) security. Applications that are required to transmit and receive data would select an algorithm suite that supports the objective of Data-in-Transit security. We have provided recommendations on the selection of crypto suites within an application based on application and security objectives.
Application objective |
---|
Month | Savings |
---|---|
January | $100 |
Key Strength
Selecting
Enforcing
Maintaining
Memory Management Considerations
Perfect Forward Secrecy
Proxy Handling
Key Management Lifecycle Best Practices
Generation
Distribution
EndPoint Authentication
Algorithms and Protools
Integrity and Confidentiality
Storage
Software-based Storage
Hardware Storage
Escrow and Backup
Key Escrow
Key Backup
Tracking and Audit
Key Compromise and Recovery
Trust Stores
Population
Secure Update
Cryptographic Module Topics
Standards
Cryptographic Key Management Libraries
This article is focused on providing application security testing professionals with a guide to assist in managing cryptographic keys.
Authors and Primary Editors
Brian Russell - russellbri[at]leidos.com
Drew Van Duren - drew.f.van.duren[at]leidos.com
Other Cheatsheets
OWASP Cheat Sheets Project Homepage
This project is part of the OWASP Builders community. Feel free to browse other projects within the Defenders, Builders, and Breakers communities. |