Welcome » IT Booklets » Information Security » Security Controls Implementation » Encryption » Encryption Key Management
Since security is primarily based on the encryption keys, effective key management is crucial. Effective key management systems are based on an agreed set of standards, procedures, and secure methods that addressSource: ISO 17799, 10.3.5.2
Secure key management systems are characterized by the following precautions: