Key Management
Private Key Storage
Development:- Use HSM or KMS (AWS KMS, Azure Key Vault, GCP KMS)
- Never store keys in code or environment variables
- Implement key rotation (90-day schedule)
Key Rotation
Credential Issuance
Verification Before Signing
- Identity verification - KYC/KYB checks complete
- Schema validation - All required fields present
- Business logic - Conditional rules pass
- Security checks - No prohibited content
Appropriate Expiration
- Developer credentials: 6-12 months
- Agent credentials: 3-6 months
- High-risk use cases: 3 months with renewal
Credential Verification
Always Check
- Signature - Cryptographic validity
- Issuer - From trusted issuer list
- Expiration - Not expired or not-yet-valid
- Revocation - Check status list
- Policy - Meets requirements
Trusted Issuer List
Audit & Monitoring
Log All Verifications
Alert on Anomalies
- Revoked credential usage attempts
- Failed verification spikes
- Unexpected issuer appearances
- Policy violation patterns
Compliance
Data Handling
- PII in credentials: Minimize or hash
- Audit logs: Retain for compliance period
- GDPR: Right to erasure for credential subjects
Regulatory Alignment
- NIST AI RMF: Map fields to controls
- SOC 2: Document verification processes
- ISO 27001: Include in ISMS