Skip to main content

ER-42 Walkthrough - Privileged Access to the Encryption Keys

Suzette Richards avatar
Written by Suzette Richards
Updated over a year ago

What to Provide

A screenshot demonstrating all users with privileged access to encryption keys.

Evidence Format
Screenshots or exported images in a common image file type such as .jpg, .png, or .pdf.

Additional Guidance

The evidence should demonstrate all users that can:

  • Add, modify, or delete encryption keys

  • Grant access to encryption keys

NOTE: If direct access to encryption keys is governed via the CSP console, please (1) note in the "Evidence Description" section of the ER all of the specific groups/role permissions that would provide a user privileged access to the encryption keys through the CSP console authentication mechanism, and (2) provide a screenshot of all users assigned to the associated groups/role permissions that would provide privileged access to encryption keys.

Related Articles

Associated Unified Control ID

Associated Framework Control

CTRL-9

LCL-32

Did this answer your question?