Cryptographic Architecture

V1.6.1

Verify that there is an explicit policy for management of cryptographic keys and that a cryptographic key lifecycle follows a key management standard such as NIST SP 800-57.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 320

V1.6.2

Verify that consumers of cryptographic services protect key material and other secrets by using key vaults or API based alternatives.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 320

V1.6.3

Verify that all keys and passwords are replaceable and are part of a well-defined process to re-encrypt sensitive data.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 320

V1.6.4

Verify that the architecture treats client-side secrets--such as symmetric keys, passwords, or API tokens--as insecure and never uses them to protect or access sensitive data.

Level 1 required: False

Level 2 required: True

Level 3 required: True

CWE: 320

Disclaimer:

Credit via OWASP ASVS. For more information visit The OWASP ASVS Project or Github respository.. OWASP ASVS is under the Creative Commons Attribution-Share Alike v3.0 license.

Github logo View source on GitHub

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.