This section answers two questions:
What are Key Custodian (KC) responsibilities in an environment running SAKA?
How are these responsibilities carried out?
Security policies at companies define what company employees may and may not do with company resources. Since Enterprise Key Management (EKM) is a relatively new and specialized discipline, companies are unlikely to have policies associated with EKM and what specific roles within the EKM Infrastructure (EKMI)can do.
The following is a template of a policy that can be adapted and used by SAKA customers to define the responsibilities of Key Custodians and other roles touching upon the SAKA. While it is unlikely to cover all possible situations, it does identify the core responsibilities of the roles involved.
POLICY INFORMATION |
||
---|---|---|
Version |
1.0 |
|
Effective Date |
September 12, 2018 |
|
Intranet URL |
http://intranet.company.com/policies/security/pci-dss/keycustodians.html
|
|
CONTENTS |
||
|
General Information Roles Resources Processes Responsibilities Related Policies Other Resources Document Information |
|
GENERAL INFORMATION |
||
Purpose |
This document defines COMPANYNAME's policy for the responsibilities of Key Custodians (KC) as required by the Payment Card Industry's Data Security Standard (PCI DSS). |
|
Applicability |
This policy applies to all Employees, Contractors, Consultants, Outsourcers, and Service Providers of COMPANYNAME who are designated and required to perform in the capacity of a KC. |
|
Background |
The Payment Card Industry Data Security Standard‡ (PCI DSS) is an industry regulation for the protection of sensitive credit card data. Amongst many security requirements, it mandates the encryption of Personal Account Numbers (PAN) when stored on a computerized device. Cryptographic encryption keys used for protecting the information are required to be managed with “appropriate key management” operations as defined in the PCI DSS Key Management (KM) section of Requirements and Security Assessment Procedures, Version 3.2, dated April 2016. |
|
Policy Owner |
The creation, implementation and any subsequent changes to this policy is the responsibility of the Chief Security Officer (CSO). This policy and any subsequent changes must be approved by two or more of the following officers of the company:
|
|
Sensitive Data |
Confidential personal information (to be hereinafter called Sensitive Data) is currently defined by the company, to be any one of the following:
|
|
ROLES |
||
Chief Security Officer |
The CSO is the owner of this policy. |
|
Key Custodian |
The KC is a part owner of the cryptographic keys established by COMPANYNAME to protect Sensitive Data. |
|
Encryption Domain Administrator |
The encryption domain administrator (EDA or DA) is the technical administrator of the cryptographic keys and data created and maintained by COMPANYNAME. |
|
Authorized Users |
Any human user or software application executing on any device that needs to access Sensitive Data is an Authorized User (AU). AUs must be explicitly permitted to perform any function within the cryptographic systems established by COMPANYNAME. |
|
RESOURCES |
||
StrongAuth KeyAppliance |
COMPANYNAME has purchased and deployed the StrongKey KeyAppliance (SAKA) to comply with PCI DSS requirements for encryption and key management (EKM). While many of the statements in this policy document are technology-independent, some statements are specific to the implementation chosen by COMPANYNAME and how they are carried out within SAKA. In the event SAKA conflicts with this policy, COMPANYNAME will work with the vendor to resolve the differences. Where SAKA goes above and beyond this policy, all roles are required to adhere to the requirements of the SAKA implementation. |
|
|
|
|
PROCESSES |
||
Requesting Access to the SAKA |
|
|
Revoking Access to the SAKA |
|
|
RESPONSIBILITIES |
||
All Employees |
All Employees, Contractors and Consultants employed by COMPANYNAME are required to comply with this policy, without exception. |
|
Chief Security Officer |
The CSO is responsible for:
|
|
Key Custodians |
The KC is responsible for:
|
|
Encryption Domain Administrator |
The EDA/DA is responsible for:
|
|
Internal Auditor |
The IA is responsible for:
|
|
RELATED POLICIES |
||
|
|
|
OTHER RESOURCES |
||
|
||
|
SAKA Documentation |
|
|
|
|
DOCUMENT INFORMATION |
||
Version |
1.0 |
|
Date |
||
Notes |
DRAFT template of policy |
|
Author |
John Doe, Legal |
|
Reviewed By |
John Doe, Legal Sherlock Holmes, Internal Audit |
|
Approved By |
James T. Kirk, CEO |