Zum Hauptinhalt springen
Starter Kit · Register

Cryptography Register

Updated on 2 min Reviewed by: Cenedril-Redaktion
A.8.24 ISO 27001BSI CON.1

The cryptography register documents all cryptographic keys and certificates in your organisation — including algorithm, key length, expiry date and rotation cycle. Without this register, you cannot tell which systems are affected when a key is compromised or expires.

ISO 27001 A.8.24 (Use of Cryptography) requires that rules for the use of cryptography are defined and implemented — including key management. The register is the operational tool that keeps you in control.

What does it contain?

Each row represents one cryptographic key or certificate. The columns:

  • Key ID / Purpose — unique identifier and use case (e.g. TLS wildcard, database encryption, code signing)
  • Algorithm / Key Length — algorithm in use (RSA, AES, Ed25519) and key length
  • Owner / System — responsible person and the system where the key is deployed
  • Created / Expiry / Rotation Interval — creation date, expiry date and planned rotation cadence
  • Storage / Backup / Status — storage location, backup method and current status

How to use it

Initial population: Inventory all active keys and certificates. Start with TLS certificates (publicly visible, easy to find) and then work through internal encryption keys, SSH keys and code-signing certificates.

Ongoing maintenance: With every key rotation, renewal or new issuance, update the register. Expired or revoked keys stay in the register (status: Expired/Revoked) — this keeps the lifecycle traceable.

Regular review: Once a quarter, check which keys expire within the next 90 days and schedule renewals. At the same time, verify that the algorithms and key lengths in use still meet current best practice.

Register Template

Cryptography Register

Key IDPurposeAlgorithmKey LengthOwnerSystemCreatedExpiryRotation IntervalStorageBackupStatus
KEY-001TLS wildcard *.nordwind-logistics.comRSA2048IT Operations LeadNginx frontend2025-09-012026-09-0112 monthsLet's Encrypt ACMEN/AActive
KEY-002TLS api.nordwind-logistics.comECDSA P-256256IT Operations LeadAPI gateway2025-10-152026-10-1512 monthsLet's Encrypt ACMEN/AActive
KEY-003Database encryption at rest (Customer DB)AES-GCM256IT Operations LeadPostgreSQL RDS2024-04-01N/A24 monthsAWS KMS CMKKMS multi-regionActive
KEY-004Backup encryptionAES-GCM256IT Operations LeadVeeam repository2024-01-10N/A24 monthsHSMOffsite HSMActive
KEY-005S/MIME email signing ISORSA4096ISOM365 Outlook2025-06-012028-06-0136 monthsSmartcardN/AActive
KEY-006Code signing certificateRSA3072Head of EngineeringCI pipeline2025-02-012027-02-0124 monthsHSMHSM backupActive
KEY-007SSH host keys prod clusterEd25519256IT Operations LeadLinux servers2024-11-01N/A36 monthsHost filesystemConfig mgmtActive
KEY-008VPN pre-shared keyN/AN/AIT Operations LeadVPN gateway2025-08-012026-08-0112 monthsPassword managerSecure vaultActive
KEY-009Disk encryption recovery keys (fleet)AES256IT Operations LeadBitLocker / FileVaultContinuousN/APer deviceMDM escrowMDM backupActive
KEY-010Database backup AES key (archive)AES-CBC256IT Operations LeadS3 archive2024-01-012027-01-0136 monthsAWS KMSKMS multi-regionActive

Sources

ISO 27001 Controls Covered

A.8.24 Use of cryptography

Frequently asked questions

Which keys belong in the cryptography register?

All cryptographic keys and certificates in use across your organisation: TLS certificates, SSH keys, database and backup encryption keys, code-signing certificates and API tokens with a cryptographic basis. Keys managed by third parties (e.g. cloud KMS keys) belong in the register too.

How often should keys be rotated?

ISO 27001 does not prescribe a fixed interval. Common practice: TLS certificates annually (or shorter with automation), SSH keys every 12–24 months, database encryption keys every 12 months. The register includes a Rotation Interval column where you define the cadence per key.

What happens when a key is compromised?

Immediate revocation, issuance of a new key and documentation in the register (status set to Revoked, reason in comments). Your incident response process should cover this case — the register ensures you know which systems are affected.