SC-12 (3) - Asymmetric Keys
Control requirements
SC-12 (3) - 0
Produce, control, and distribute asymmetric cryptographic keys using [IBM Assignment: Refer to Supplemental Guidance for Cryptography Governance].
NIST supplemental guidance
[SP 800-56A], [SP 800-56B], and [SP 800-56C] provide guidance on cryptographic key establishment schemes and key derivation methods. [SP 800-57-1], [SP 800-57-2], and [SP 800-57-3] provide guidance on cryptographic key management.