Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SC

SC-12Cryptographic Key Establishment and Management

Establish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: {{ insert: param, sc-12_odp }}.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (3)

ATT&CK techniques this control mitigates (10)

Weaknesses this control addresses (10)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-319Cleartext Transmission of Sensitive Information1,042Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.
CWE-312Cleartext Storage of Sensitive Information915Key-management policy requires protected storage of key material, preventing cleartext storage of sensitive cryptographic keys.
CWE-326Inadequate Encryption Strength513Establishment procedures require selection and generation of keys with adequate length and strength for the chosen algorithm.
CWE-330Use of Insufficiently Random Values420Key generation under controlled management uses approved random-bit sources rather than insufficiently random values.
CWE-321Use of Hard-coded Cryptographic Key277Proper key establishment and management processes directly preclude embedding static cryptographic keys in source code or binaries.
CWE-338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)202Cryptographic key management standards require cryptographically strong PRNGs for key material, blocking use of weak generators.
CWE-331Insufficient Entropy141Approved key-establishment methods mandate sufficient entropy during key generation, eliminating entropy-starved keys.
CWE-340Generation of Predictable Numbers or Identifiers39Controlled key-establishment processes produce unpredictable key values instead of values derived from observable or guessable state.
CWE-324Use of a Key Past its Expiration Date19Key-management requirements enforce lifecycle controls that prevent continued use of expired or superseded keys.
CWE-332Insufficient Entropy in PRNG12Managed key generation relies on PRNGs seeded and operated with adequate entropy, avoiding the listed weakness.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-133165.98.10.7168good
CVE-2025-571742.19.80.0151good
CVE-2025-671122.09.80.0015good
CVE-2026-263352.09.80.0057good
CVE-2025-342562.09.80.0021good
CVE-2025-150162.09.80.0015good
CVE-2025-594072.09.80.0012good
CVE-2026-239582.09.80.0003good
CVE-2025-417022.09.80.0024good
CVE-2025-341982.09.80.0023good
CVE-2025-556192.09.80.0014good
CVE-2025-156181.89.10.0005good
CVE-2025-300951.89.00.0034good
CVE-2025-263401.88.80.0019good
CVE-2025-449631.89.00.0011good
CVE-2025-302341.78.30.0013good
CVE-2026-330721.68.20.0002good
CVE-2025-118991.68.10.0012good
CVE-2015-101481.68.20.0001good
CVE-2024-540271.68.20.0008good
CVE-2026-257261.68.10.0002good
CVE-2024-535221.67.50.0096good
CVE-2024-528811.57.50.0011good
CVE-2026-323241.57.70.0001good
CVE-2024-574321.57.50.0012good

Other controls in family SC

SC-1 SC-10 SC-11 SC-13 SC-14 SC-15 SC-16 SC-17 SC-18 SC-19 SC-2 SC-20 SC-21 SC-22 SC-23 SC-24 SC-25 SC-26 SC-27 SC-28 SC-29 SC-3 SC-30 SC-31 SC-32 SC-33 SC-34 SC-35 SC-36 SC-37 SC-38 SC-39 SC-4 SC-40 SC-41 SC-42 SC-43 SC-44 SC-45 SC-46 SC-47 SC-48 SC-49 SC-5 SC-50 SC-51 SC-6 SC-7 SC-8 SC-9