This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Key Management Cheat Sheet"

From OWASP
Jump to: navigation, search
(Algorithm Selection)
(Algorithm Selection)
Line 15: Line 15:
 
<th> Application objective </th>
 
<th> Application objective </th>
 
</tr>
 
</tr>
 +
</table>
 +
 +
 +
<table>
 +
  <tr>
 +
    <th>Month</th>
 +
    <th>Savings</th>
 +
  </tr>
 +
  <tr>
 +
    <td>January</td>
 +
    <td>$100</td>
 +
  </tr>
 
</table>
 
</table>
  

Revision as of 21:05, 15 April 2015

DRAFT CHEAT SHEET - WORK IN PROGRESS

Introduction

This Key Management Cheat Sheet provides developers with guidance for implementation of cryptographic key management within application in a secure manner.

Key Management General Guidelines and Considerations

Algorithm Selection

Selection of the cryptographic and key management algorithms to use within a given application should begin with an understanding of the objectives of the application. For example, if the application is required to store data securely, then the developer should select an algorithm suite that supports the objective of Data-At-Rest (DAR) security. Applications that are required to transmit and receive data would select an algorithm suite that supports the objective of Data-in-Transit security. We have provided recommendations on the selection of crypto suites within an application based on application and security objectives.

Application objective


Month Savings
January $100

Key Strength

Selecting

Enforcing

Maintaining

Memory Management Considerations

Perfect Forward Secrecy

Proxy Handling

Key Management Lifecycle Best Practices

Generation

Distribution

EndPoint Authentication

Algorithms and Protools

Integrity and Confidentiality

Storage

Software-based Storage

Hardware Storage

Escrow and Backup

Key Escrow

Key Backup

Tracking and Audit

Key Compromise and Recovery

Trust Stores

Population

Secure Update

Cryptographic Module Topics

Standards

Cryptographic Key Management Libraries

This article is focused on providing application security testing professionals with a guide to assist in managing cryptographic keys.

Authors and Primary Editors

Brian Russell - russellbri[at]leidos.com

Drew Van Duren - drew.f.van.duren[at]leidos.com

Other Cheatsheets

OWASP Cheat Sheets Project Homepage


This project is part of the OWASP Builders community.
Feel free to browse other projects within the Defenders, Builders, and Breakers communities.