What should be included in the key mgmt inventory for compliance?

Prepare for the PCI DSS Test with detailed questions and explanations. Use flashcards and quizzes to enhance knowledge. Ensure you're ready for your certification exam!

Multiple Choice

What should be included in the key mgmt inventory for compliance?

Explanation:
Key management relies on the devices that actually protect and handle cryptographic keys. The inventory must include hardware security modules and other secure cryptographic devices because these are the components responsible for generating, storing, protecting, and controlling access to keys, and they require ongoing oversight of location, ownership, access controls, firmware, and lifecycle. Without knowing what devices exist and how they’re configured, you can’t effectively enforce key protection or respond to incidents. An inventory of people, generic software licenses, or shipments doesn't directly help manage the security of cryptographic keys or the devices that protect them, so they aren’t appropriate here.

Key management relies on the devices that actually protect and handle cryptographic keys. The inventory must include hardware security modules and other secure cryptographic devices because these are the components responsible for generating, storing, protecting, and controlling access to keys, and they require ongoing oversight of location, ownership, access controls, firmware, and lifecycle.

Without knowing what devices exist and how they’re configured, you can’t effectively enforce key protection or respond to incidents. An inventory of people, generic software licenses, or shipments doesn't directly help manage the security of cryptographic keys or the devices that protect them, so they aren’t appropriate here.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy