Knowledge ID: K0698
Knowledge of cryptographic key management principles and practices
Work roles with this Knowledge
Security Control Assessment
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-012Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Systems Authorization
Category: Oversight and GovernanceNICE Framework ID: OG-WRL-013Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.
Cybersecurity Architecture
Category: Design and DevelopmentNICE Framework ID: DD-WRL-001Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Secure Systems Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-004Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.
Systems Requirements Planning
Category: Design and DevelopmentNICE Framework ID: DD-WRL-006Responsible for consulting with internal and external customers to evaluate and translate functional requirements and integrating security policies into technical solutions.
Technology Research and Development
Category: Design and DevelopmentNICE Framework ID: DD-WRL-008Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Database Administration
Category: Implementation and OperationNICE Framework ID: IO-WRL-002Responsible for administering databases and data management systems that allow for the secure storage, query, protection, and utilization of data.
Systems Security Analysis
Category: Implementation and OperationNICE Framework ID: IO-WRL-006Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.
Defensive Cybersecurity
Category: Protection and DefenseNICE Framework ID: PD-WRL-001Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.
Vulnerability Analysis
Category: Protection and DefenseNICE Framework ID: PD-WRL-007Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Cyber Intelligence Planning
Category: Cyberspace IntelligenceNICE Framework ID: CI-WRL-004Responsible for developing intelligence plans to satisfy cyber operation requirements. Identifies, validates, and levies requirements for intelligence collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
Cyberspace Operations
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-001Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.
Cyber Operations Planning
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-002Responsible for developing cybersecurity operations plans; participating in targeting selection, validation, and synchronization; and enabling integration during the execution of cyber actions.
Partner Integration Planning
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-005<p>Responsible for advancing cooperation across organizational or national borders between cyber operations partners. Provides guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.</p>
Target Network Analysis
Category: Cyberspace EffectsNICE Framework ID: CE-WRL-007Responsible for conducting advanced analysis of collection and open-source data to ensure target continuity; profiling targets and their activities; and developing techniques to gain target information. Determines how targets communicate, move, operate, and live based on knowledge of target technologies, digital networks, and applications.
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)