From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Key management practices

Key management practices

- Cryptographic keys serve as the literal keys to unlocking information secured using encryption. Security professionals must be careful to preserve the secrecy, and security of these keys in order to maintain the integrity of their use of encryption. When generating new cryptographic keys, you must be certain to create them in a secure manner. This means creating keys that are randomly generated. The ideal encryption key is a long binary value composed of randomly selected ones and zeros. This eliminates the possibility that an attacker will be able to guess the key by figuring out how you created it because there's no rhyme or reason to its composition. It's random. In addition to using a randomly generated key, you should also use a key that's sufficiently long to avoid brute force attacks. I'll talk about those attacks later in this course, but the general idea is that you're trying to select a key that is so long that it's impossible to guess the key because there are just too…

Contents