ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework

  • Home
  • ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework

Category: 
Cybersecurity
SDO: 
IEC
ISO
ICT domain: 
IT Security

In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and for non-repudiation functions. The security and reliability of such mechanisms are directly dependent on the management and protection afforded to a security parameter, the key.
This part of ISO/IEC 11770:

a) establishes the general model on which key management mechanisms are based.

b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770.

c) specifies the characteristics of key management services.

d) establishes general principles on the management of keying material during its life cycle.

e) establishes the conceptual model of key distribution.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-1:ed-2:v1:en

Filter by Standard/Working group: