SC-28(1) - Protection of Information at Rest | Cryptographic Protection

Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following information at rest on [Assignment: organization-defined system components or media]: [Assignment: organization-defined information].


ID: SC-28(1)
Enhancement of : SC-28

Space Segment Guidance

Cryptographic protection at rest often balances assurance with CPU/power limits. Consider selective encryption for the most sensitive items (e.g., keys, credentials, sensitive payload data) with authenticated integrity for broader datasets. Align key storage and recovery with safe-mode and reset behavior, e.g., protected key slots, escrow/golden keys, and tested unlock paths, so access to critical data persists for recovery without risking lockout.