Joint guidance on managing cryptographic keys and secrets – Canadian Centre for Cyber Security
Summary
The Canadian Centre for Cyber Security, together with the Australian Signals Directorate’s ACSC and international partners (Australia DISR, JPCERT/CC, Japan NCO, New Zealand NCSC, and the UK NCSC), has released joint guidance on managing cryptographic keys and secrets. The guidance focuses on lifecycle management, threat understanding and practical protections for asymmetric keys, digital certificates, symmetric keys and other secrets. It is aimed primarily at security personnel and organisations responsible for protecting cryptographic assets.
Key Points
- This is a multinational, coordinated guidance effort across Canada, Australia, Japan, New Zealand and the UK.
- Focus areas include lifecycle management, storage, use, rotation and destruction of keys and secrets.
- Types of material covered: asymmetric keys, digital certificates, symmetric keys and other secrets.
- Compromise of keys or secrets can severely affect operations, finances and reputation — timely detection and response are emphasised.
- The guidance helps organisations assess threat environments and implement secure key-management controls and practices.
- Full technical guidance and recommendations are available via the linked Australian resource.
Context and Relevance
Strong cryptographic key and secret management is central to secure infrastructure — from TLS certificates and code signing to cloud keys and device identity. This guidance reflects growing international consensus on crypto hygiene, zero-trust principles and supply-chain resilience. For organisations deploying cloud services, DevOps pipelines, IoT devices or certificate-based authentication, these recommendations provide a practical baseline and reinforce regulatory and compliance expectations.
Why should I read this?
Short version: if you or your team touch keys, certs or any secret — read it. It’s a tidy, cross‑country consensus on how to avoid common crypto mistakes that lead to breaches. Saves you time and gives you a checklist that security teams actually need.
Source
Source: https://cyber.gc.ca/en/news-events/joint-guidance-managing-cryptographic-keys-secrets