CISSP Study Guide: The M of N Control Policy | Cybrary (2024)

Amazon Web Services is currently experiencing an outage that may impact your experience on the Cybrary application. We apologize for any inconvenience and will be monitoring this situation closely

CISSP Study Guide

December 16, 2022

CISSP Study Guide: The M of N Control Policy | Cybrary (68)

Cybrary

CISSP Study Guide: The M of N Control Policy | Cybrary (69)

This is a back-up process of public and private key material over multiple systems or devices. It’s a tool that prevents the re-creation of private and public key material from the backup. The key materials are backed up and then mathematically distributed across several systems or devices. Usually three people are assigned specific, separate job responsibilities within different portions of the organization. These clarifications impede attempts to recover keys without permission. The mathematical equation supports any number of users up to 255 for the splitting activity.

Assuming a key can be used throughout its validation period without revocation, it is then renewed. Identity verification is not required to obtain a new certificate. If the certificate is in good standing, and the key is renewed with the same CA, the old key can be used to sign the request for the new key. There should be established trust between the renewer and the CA based on the person’s credentials.

Key update is a second type of renewal where a new key is produced by modifying the existing key. The process of key renewal depends on the user and CA requirements. The process is also applied with a CA’s key pair as those keys undergo renewal as well. A CA can also use its old key to sign the new key. The PKI renewal process is performed by creating three new keys.

  1. The CA produces another self-signed certificate. This time, the CA signs the new public key using the old private key that is about to expire.
  2. Next, the CA server signs the old public keys with the new private key. This is done to avoid an overlap between the new key activation and old key expiration.
  3. Lastly, the new public key is signed with the new private key.

The reason for these steps is based on two important points:

  1. Since a CA verifies the credentials of other parties, rigorous steps need to be implemented when renewing the CA’s own certificate.
  2. Creating numerous keys makes the changeover from old keys to new keys transparent to the end user.

When a key pair and certificate validation expire, they must be destroyed. If the key pair is used for digital signatures, the private key portion should be destroyed to prevent future signing attempts. Key pairs used for privacy purposes can be archived in case it needs to be used to decrypt archived data that was encrypted using it. The digital certificate must be added to the CRL as soon as the certificate is no longer valid. This process occurs irrespective of the archive or non-archive status of the private key for future use. The extra step of notifying individuals who use the certificate of its invalid status may be needed depending on the sensitivity level.

Start learning with Cybrary

CISSP Study Guide: The M of N Control Policy | Cybrary (70)

Create a free account

CISSP Study Guide: The M of N Control Policy | Cybrary (71)

Related Posts

All Blogs

CISSP Study Guide: The M of N Control Policy | Cybrary (72)

Building a Security Team

June 27, 2023

Digital Forensics and Incident Response: What It Is, When You Need It, and How to Implement It

A quick guide to digital forensics and incident response (DFIR): what it is, when it’s needed, how to implement a cutting-edge program, and how to develop DFIR skills on your team.

Read More

CISSP Study Guide: The M of N Control Policy | Cybrary (73)

Building a Security Team

June 28, 2023

How to Build a Red Team

An overview of what a red team is (and isn’t), and practical tips on how to build a Red Team and develop offensive security skills in your team.

Read More

CISSP Study Guide: The M of N Control Policy | Cybrary (74)

Tools & Applications

June 7, 2023

How to Make the Most of Blending Learning with Cybrary Live

Learn how to get the most from your cybersecurity training platform by blending on-demand learning with virtual, live courses led by industry experts.

Read More

CISSP Study Guide: The M of N Control Policy | Cybrary (75)

News & Events

June 7, 2023

Introducing the New Cybrary Learner Experience

Cybrary is launching a key update to the Cybrary Learner experience to elevate hands-on learning and measurement as guiding tenets of Cybrary’s mission.

Read More

CISSP Study Guide: The M of N Control Policy | Cybrary (2024)

FAQs

What is the M of N control policy? ›

A protection measure that requires that a minimum number of agents (M) out of the total number of agents (N) work together to perform high-security tasks.

What is the M of N control for critical keys? ›

M of N is about sharing the risk and agreeing to use a key

First thing's first — the N represents the number of parts, and the M represents the minimum number of those parts you need to make this process work. The numbers might be three out of four. Or five out of 50.

What are the different types of controls in Cissp? ›

To apply these measures, controls can be administrative, technical, and physical. Administrative controls are the rules and procedures implemented by the organization. Security awareness training, password administration, background checks are preventive administrative controls.

What is m of n? ›

The term m-of-n describes the precise conditions of a multisig setup, with m being the number of signatures required, and n being the number of authorized keys from which the signatures can come.

What are four elements of access control policy? ›

To understand access control policies you need to understand four main concepts: users, actions, resources, and relationships. Users are the people who use the system. Resources are objects in the system that need to be protected. Actions are the activities that users can perform on the resources.

What is the key control policy? ›

At its core, key control refers to the policies, systems, and procedures that govern how keys are issued, tracked, and managed. Key control policies go hand in hand with access control systems because they both ensure only authorized employees or personnel have access to facilities or specific areas.

What is master key in CNS? ›

A master key is a symmetric key that is used to encrypt multiple subordinate keys. Its length will typically be 128 – 256 bits, depending on the algorithm used, and it will have a very long life, possibly even indefinite. It must therefore be well protected, e.g. by using a hardware security module (HSM).

What is encryption key escrow? ›

Key escrow (also known as a "fair" cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow so that, under certain circ*mstances, an authorized third party may gain access to those keys.

What are the 3 types of security controls? ›

The three main types of security controls—management, operational, and physical—work together to form a strong security program.

What is an example of a compensating control in Cissp? ›

Compensating controls provide contingent or alternative protection to existing controls. For example, PIN code is compensating for the Windows Hello facial recognition.

What are the operational controls for Cissp? ›

A type of security control that focuses on the day-to-day operations of an organization. It includes procedures, policies, and standards that are designed to prevent, detect, and respond to security incidents. Examples of operational controls include access controls, change management, and incident response plans.

How do you calculate M and N? ›

  1. n(mol) = m(g) / M(g/mol) where m is the mass and M is the molar mass of the given substance. ...
  2. M(g/mol) = m(g)/ n(mol) By rearranging this equation you can also calculate how many grams, a certain number of moles should weigh, by isolating m in the equation:
  3. m(g) = n(mol) * M(g/mol)

What is the ratio of M and N? ›

The ratio of the sums of m and n terms of an A.P. is m2:n2.

How to find m with n and m? ›

Worked Example: molar mass = mass ÷ moles (M=m/n)

What is network access control policy? ›

Network access control (NAC), also known as network admission control, is the process of restricting unauthorized users and devices from gaining access to a corporate or private network.

What is the control policy? ›

The Control Policy feature provided by the Resource Directory service enables you to manage the permission boundaries of the folders or members in a resource directory in a centralized manner. This feature is implemented based on the resource directory.

What is an example of an access control policy? ›

Rule-based Access Control allows or denies resource access based on a set of rules and limitations set by the system administrator. For example, Rule-Based Access Control can be used to restrict data access on holidays, or after working hours.

Top Articles
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5838

Rating: 4.9 / 5 (49 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.