NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-12(5)PKI Certificates / Hardware Tokens

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

For high-security environments, PKI certificates and private keys should be stored on hardware tokens (smart cards, HSMs) rather than in software keystores.

Example 1: Issue CAC/PIV smart cards to users for authentication. The private key is generated on the card and never leaves the hardware. Users must insert the card and enter a PIN to authenticate — two factors in one device.

Example 2: Store your certificate authority's signing key in a FIPS 140-2 Level 3 Hardware Security Module (HSM). The HSM performs all signing operations internally — the private key cannot be exported, copied, or extracted from the hardware.