Key Management
The HITRUST CSF v11 key management requirement means you must run a documented, enforced lifecycle for cryptographic keys: generation, distribution, storage, rotation/retirement, and destruction, using approved systems so keys stay protected from creation through end-of-life (HITRUST CSF v11 Control Reference). Operationalize it by standardizing where keys live, who can touch them, how they rotate, and what evidence proves the lifecycle works.
Key takeaways:
- Centralize and standardize key lifecycle handling (create, store, rotate/retire, destroy) under approved systems (HITRUST CSF v11 Control Reference).
- Treat access to keys as privileged access; log, review, and tightly scope it to roles and systems that must have it.
- Evidence wins audits: you need policies, key inventories, system configs, rotation/destruction records, and access logs that tie to each key’s lifecycle.
“Key management” is one of those requirements that looks straightforward until an assessor asks you to show the lifecycle for every meaningful key type across your environment: database encryption keys, cloud KMS customer-managed keys, application secrets, TLS private keys, backup encryption keys, and keys held by third parties. HITRUST CSF v11 10.g sets a lifecycle expectation: you must have procedures that cover key generation, distribution, storage, retirement, and destruction, and you must execute those procedures using approved systems and processes that protect keys throughout their lifecycle (HITRUST CSF v11 Control Reference).
For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as an operational governance problem: define “approved key management,” inventory where keys exist, then enforce consistent handling through a small set of platforms (for example, cloud KMS/HSM plus a secrets manager) and a clear operating model (ownership, access, rotation triggers, break-glass, and evidence capture). This page gives you requirement-level implementation steps, audit-ready artifacts, and the hangups that commonly derail teams during HITRUST assessments.
Regulatory text
Requirement (HITRUST CSF v11 10.g): Key management must support the organization’s cryptographic techniques. Procedures must cover key generation, distribution, storage, retirement, and destruction, and must use approved key management systems and processes that protect keys throughout the lifecycle (HITRUST CSF v11 Control Reference).
What an operator must do:
You need to (1) define lifecycle procedures, (2) enforce them through approved platforms and configurations, and (3) retain evidence showing the lifecycle is consistently applied for keys that protect sensitive systems and data (HITRUST CSF v11 Control Reference).
Plain-English interpretation (what auditors expect you to mean)
Auditors are looking for proof that cryptographic keys are not treated like informal “app settings.” Keys must be created securely, stored in approved systems (not in code repositories or shared drives), distributed only to authorized components, rotated or retired based on defined triggers, and destroyed in a way that prevents recovery. “Approved” means you explicitly designate which tools, services, and processes are allowed to manage keys, and you can demonstrate that teams actually use them (HITRUST CSF v11 Control Reference).
If you only have a policy but keys are scattered across scripts, CI/CD variables, developer laptops, and unmanaged certificates, you will struggle to show lifecycle control.
Who it applies to (entity + operational context)
Entity types: All organizations in scope for HITRUST that use cryptography for confidentiality, integrity, authentication, or non-repudiation (HITRUST CSF v11 Control Reference).
Operationally, this hits:
- Security and IAM (privileged access to KMS/HSM, key admin roles, logging)
- Infrastructure/Cloud platform teams (KMS/HSM configuration, encryption defaults, backups)
- Application engineering (secrets handling, app encryption, TLS cert private keys)
- Data and database teams (TDE keys, column-level encryption keys, key rotation feasibility)
- Third parties that generate, store, or manage keys on your behalf (for example, managed database services, SaaS with customer-managed keys, managed PKI), because your procedures must cover distribution, retirement, and destruction even when shared responsibility applies (HITRUST CSF v11 Control Reference).
What you actually need to do (step-by-step)
1) Define “approved key management systems and processes”
Create a short, enforceable standard that answers:
- Which platforms are approved for key storage and cryptographic operations (for example, cloud KMS/HSM, on-prem HSM, secrets manager).
- Which repositories are explicitly not approved (source code repos, ticket attachments, shared drives, wikis).
- Required properties: access control model, logging, backup behavior, segregation of duties, and break-glass rules.
Deliverable: Key Management Standard + Approved Technology List (HITRUST CSF v11 Control Reference).
2) Build a key inventory you can defend
You cannot manage a lifecycle you can’t enumerate. Inventory should include:
- Key identifier / name
- Key type (data-at-rest, TLS private key, token signing key, backup key, secrets)
- Owning system and business owner
- Where stored (KMS/HSM/secrets manager)
- Rotation/retirement trigger
- Access control group/role mapping
- Dependent applications and environments (prod/non-prod)
- Destruction method and prerequisites (data re-encryption, cert re-issuance)
Practical tip: Start with “keys that protect regulated data and production authentication.” Expand later.
3) Standardize generation and storage
- Generation: Require keys to be generated by approved KMS/HSM where feasible, or by a controlled process that documents entropy source and custody.
- Storage: Store keys only in approved systems; applications should reference keys via identifiers/handles, not raw material.
- Separation: Split key admin from key usage where your tooling supports it (admin can manage policy; apps can encrypt/decrypt).
Audit focus: Evidence that keys are not exported casually and not hard-coded.
4) Control distribution and access (treat as privileged)
Implement:
- Role-based access for key admins and key users (service identities).
- Change control for permission changes to key policies.
- Logging enabled for key access and admin operations, with alerting for unusual patterns.
Common assessor question: “Who can decrypt production data?” Your answer should be a role mapping, not a list of individuals.
5) Define rotation, retirement, and destruction rules that match reality
HITRUST requires retirement and destruction procedures (HITRUST CSF v11 Control Reference). Your rules must be implementable:
- Rotation triggers: periodic rotation, compromise suspicion, staff departure for custodial roles, system migration, cryptographic deprecation.
- Retirement: mark key as “decrypt-only” or disable new encrypt operations; migrate dependents.
- Destruction: destroy key material in the approved system and record the action; ensure dependent systems have moved off the key.
Where teams fail: They set a rotation requirement, then discover legacy apps cannot re-encrypt. Write an exception process with compensating controls and a remediation backlog.
6) Create operational runbooks and integrate into workflows
You need runbooks for:
- New key request and approval
- Emergency key disablement (incident response)
- Key compromise response steps
- Key rotation procedure per key type
- Certificate private key handling (if in scope)
- Offboarding: removing access and retiring keys tied to decommissioned systems
Tie these to your ticketing/ITSM workflow so evidence is automatic (ticket IDs become traceability).
7) Manage third-party key responsibilities explicitly
If a third party stores or manages keys:
- Document the shared responsibility boundary (what they do vs what you do).
- Require contractual or due diligence evidence that their key management protects keys across the lifecycle.
- Ensure you can execute retirement/destruction requests and get confirmation.
Operational requirement: Your procedures must still “cover” lifecycle stages even if execution is delegated (HITRUST CSF v11 Control Reference).
8) Monitor and review
Set a cadence to:
- Review key inventory accuracy (new systems appear constantly).
- Review privileged access to KMS/HSM and secrets managers.
- Sample key lifecycle events (creation, rotation, destruction) to confirm evidence completeness.
If you use Daydream for third-party risk and evidence workflows, treat key management evidence as a recurring control: map each key system owner to a task list (inventory update, access review, rotation evidence upload) and assign third-party attestations to the relevant vendors for collection and renewal.
Required evidence and artifacts to retain
Keep artifacts that prove both design (your rules) and operating effectiveness (they happen in practice):
Governance
- Key Management Policy/Standard aligned to lifecycle stages (HITRUST CSF v11 Control Reference)
- Approved key management systems list and rationale
- Roles and responsibilities (RACI) for key admins, system owners, app owners
Inventory + lifecycle
- Key inventory register with owners and lifecycle status
- Key creation records (KMS/HSM events, tickets, approvals)
- Rotation/retirement logs (change tickets, KMS versioning history, deployment records)
- Destruction evidence (KMS delete schedule records or destruction confirmation, plus dependent system cutover proof)
Access control + monitoring
- IAM role definitions for key administrators and key users
- Access review evidence for privileged roles
- Audit logs enabled and retained for key management operations
- Incident response runbook for key compromise and sample tabletop notes (if you run them)
Third party
- Due diligence evidence for third parties that manage keys (contracts, questionnaires, attestations, documented responsibilities)
Common exam/audit questions and hangups
-
“Show me your approved key management systems and where they’re enforced.”
Hangup: teams say “AWS KMS” but developers store secrets in CI variables and repos. -
“Provide a key inventory for systems that encrypt regulated data.”
Hangup: no owner per key, or the “inventory” is a partial cloud export with no lifecycle fields. -
“Demonstrate rotation/retirement for a sampled key.”
Hangup: rotation is defined but never executed; no ticket trail. -
“Who can access or administer production keys?”
Hangup: too many users have admin rights; no periodic access review evidence. -
“What happens when a system is decommissioned?”
Hangup: no destruction evidence; keys linger indefinitely.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating secrets as “not keys.”
Fix: Include signing keys, API secrets, and token keys in scope if they protect authentication or data paths; manage them in an approved secrets system with lifecycle. -
Mistake: Policy-only compliance.
Fix: Create a repeatable evidence trail: ticket + log + inventory update for each lifecycle event. -
Mistake: One-size rotation requirements that engineering can’t meet.
Fix: Define rotation triggers per key category and allow exceptions with compensating controls and a remediation plan. -
Mistake: No ownership.
Fix: Require a business owner and technical owner for each key set; make ownership a gate for production go-live. -
Mistake: Overbroad KMS admin access.
Fix: Separate admin from usage roles; make key policy changes go through change control and access reviews.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement. Practically, weak key management increases blast radius: a single exposed key can turn encrypted data into plaintext access. Assessors commonly treat unmanaged keys as a critical control failure because it undermines multiple security domains (encryption, access control, logging, incident response) under a single weakness (HITRUST CSF v11 Control Reference).
Practical execution plan (30/60/90)
First 30 days (stabilize and scope)
- Publish an “approved key management” standard and prohibited storage locations (HITRUST CSF v11 Control Reference).
- Identify in-scope environments and key categories (start with production + regulated data systems).
- Stand up a key inventory template and assign owners for top systems.
- Enable and verify logging for key management operations on approved platforms.
By 60 days (operationalize lifecycle)
- Complete inventory for priority systems and third parties handling keys.
- Implement role separation for key admin vs key usage where feasible.
- Roll out runbooks: new key request, rotation, retirement, destruction, compromise response.
- Execute at least one rotation/retirement workflow end-to-end for a representative key type and capture evidence.
By 90 days (prove consistency and close gaps)
- Expand inventory coverage to remaining systems in scope.
- Run an access review for key admin roles and remediate over-permissioning.
- Perform a lifecycle evidence spot-check across sampled keys: creation, access logs, rotation/retirement, destruction where applicable.
- Formalize exception tracking for legacy constraints and convert exceptions into dated remediation work items.
Frequently Asked Questions
Does HITRUST require a specific tool like an HSM?
The requirement calls for “approved key management systems and processes,” not a specific product (HITRUST CSF v11 Control Reference). Your job is to define what’s approved in your environment and prove keys are protected through their lifecycle.
Are certificates and TLS private keys included in “key management”?
If you use TLS private keys for secure communications, they are cryptographic keys with lifecycle needs. Treat issuance, storage, rotation, and revocation/destruction as part of your key management procedures (HITRUST CSF v11 Control Reference).
What evidence is most persuasive to assessors?
A living key inventory plus system logs and change tickets that demonstrate lifecycle events: key creation, policy changes, rotation/retirement actions, and destruction records (HITRUST CSF v11 Control Reference). Policy alone rarely closes the loop.
How do we handle legacy apps that can’t rotate keys cleanly?
Document an exception with compensating controls (tight access, monitoring, limited blast radius) and a remediation plan tied to system modernization. Keep the exception time-bounded and tracked like any other security debt.
If a cloud provider manages the encryption keys, are we off the hook?
No. You still need procedures that cover lifecycle stages and evidence for how the shared responsibility works (HITRUST CSF v11 Control Reference). Document what the provider manages and what you must configure, monitor, and review.
What’s the minimum viable key inventory field set for audit?
Key identifier, key type, system owner, storage location (approved system), access roles, rotation/retirement trigger, and lifecycle status. Without owners and lifecycle status, the inventory won’t support audit sampling.
Frequently Asked Questions
Does HITRUST require a specific tool like an HSM?
The requirement calls for “approved key management systems and processes,” not a specific product (HITRUST CSF v11 Control Reference). Your job is to define what’s approved in your environment and prove keys are protected through their lifecycle.
Are certificates and TLS private keys included in “key management”?
If you use TLS private keys for secure communications, they are cryptographic keys with lifecycle needs. Treat issuance, storage, rotation, and revocation/destruction as part of your key management procedures (HITRUST CSF v11 Control Reference).
What evidence is most persuasive to assessors?
A living key inventory plus system logs and change tickets that demonstrate lifecycle events: key creation, policy changes, rotation/retirement actions, and destruction records (HITRUST CSF v11 Control Reference). Policy alone rarely closes the loop.
How do we handle legacy apps that can’t rotate keys cleanly?
Document an exception with compensating controls (tight access, monitoring, limited blast radius) and a remediation plan tied to system modernization. Keep the exception time-bounded and tracked like any other security debt.
If a cloud provider manages the encryption keys, are we off the hook?
No. You still need procedures that cover lifecycle stages and evidence for how the shared responsibility works (HITRUST CSF v11 Control Reference). Document what the provider manages and what you must configure, monitor, and review.
What’s the minimum viable key inventory field set for audit?
Key identifier, key type, system owner, storage location (approved system), access roles, rotation/retirement trigger, and lifecycle status. Without owners and lifecycle status, the inventory won’t support audit sampling.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream