IBM Cloud Docs
SC-12 (3) - Asymmetric Keys

SC-12 (3) - Asymmetric Keys

Control requirements

SC-12 (3) - 0

Produce, control, and distribute asymmetric cryptographic keys using [IBM Assignment: Refer to Supplemental Guidance for Cryptography Governance].

NIST supplemental guidance

[SP 800-56A], [SP 800-56B], and [SP 800-56C] provide guidance on cryptographic key establishment schemes and key derivation methods. [SP 800-57-1], [SP 800-57-2], and [SP 800-57-3] provide guidance on cryptographic key management.