If (cryptographic) key management is part of the archival/records management
remit, then there would be a tight coupling between an enterprise's computer
security policies, practices, & processes and its records management
policies, practices, & processes. A key breach would be an example of an
event that would trigger records management activity, perhaps for the
records as well as the key. See NIST SP 800-57 &c.
Cheers, Scott
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]