S 2.166 Provisions governing the use of crypto modules

Initiation responsibility: IT Security Officer

Implementation responsibility: IT Security Officer

An encryption module must meet a host of security requirements, even during live operation. The modules must be integrated adequately into the technical and organisational environment they are used in.

For this, some organisational regulations must be taken:

Secure operation of the encryption modules must be guaranteed, including the following:

Diverse specifications are also required for key management (see S 2.46 Appropriate key management):

Review questions: