Key Management

The processes and procedures required for the secure handling and management of encryption keys used to protect messages and/or data. They include the generation, distribution, storage, custody, use and eventual destruction of keys, including monitoring, backup and recovery procedures with the generation of secure audit trails.