Information Technology Official British Standard

BS ISO/IEC 11770-6:2016

Comprehensive standard for secure key management in information technology. Ensures confidentiality, integrity, and availability of cryptographic keys.

Secure Key Management for Information Technology

BS ISO/IEC 11770-6:2016 is the essential standard for secure key management in information technology systems. Developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), this comprehensive standard provides the framework and guidelines for the secure generation, distribution, storage, and usage of cryptographic keys.

Ensure Confidentiality, Integrity, and Availability

Effective key management is crucial for maintaining the confidentiality, integrity, and availability of sensitive data and information assets. This standard outlines best practices and requirements to:

  • Generate cryptographic keys securely and in accordance with industry-accepted algorithms and protocols
  • Distribute keys through secure channels, protecting them from unauthorized access or modification
  • Store keys in a tamper-resistant and tamper-evident manner, ensuring their long-term protection
  • Manage the lifecycle of keys, including their activation, usage, expiration, and revocation

Comprehensive Guidance for Key Management

BS ISO/IEC 11770-6:2016 provides detailed guidance on the following key management aspects:

  • Key Generation: Specifies requirements for the secure generation of cryptographic keys, including the use of approved algorithms, key lengths, and entropy sources.
  • Key Distribution: Outlines secure protocols and mechanisms for the distribution of keys, such as key transport, key agreement, and key establishment.
  • Key Storage: Provides recommendations for the secure storage of keys, including the use of hardware security modules (HSMs), key containers, and other tamper-resistant solutions.
  • Key Usage: Defines guidelines for the appropriate use of keys, including access control, authorization, and logging mechanisms.
  • Key Lifecycle Management: Covers the complete lifecycle of cryptographic keys, from generation to revocation, ensuring their secure management throughout their entire lifespan.

Compliance and Interoperability

By adhering to the requirements and guidelines specified in BS ISO/IEC 11770-6:2016, organizations can ensure that their key management practices are aligned with international standards and best practices. This not only enhances the overall security of their information systems but also facilitates interoperability with other systems and applications that comply with the same standard.

The standard is applicable to a wide range of industries and sectors, including finance, healthcare, government, and critical infrastructure, where the secure management of cryptographic keys is of paramount importance.

Technical Information

Information Technology
BSI Group
978 0 580 85013 4
Specification Details
  • Information technology
  • Security techniques
  • Key management - Key derivation
Official BSI Standard
Instant PDF Download
Industry Recognised

Purchase This Standard

Official Price
£258.00

Purchase the official standard directly from BSI Group. You'll be redirected to the official BSI website to complete your purchase.

Buy from BSI Group
Official BSI Standard
Instant PDF Download
Secure Payment