Mechanisms exist to facilitate cryptographic key management controls to protect the confidentiality, integrity and availability of keys.
Does the organization facilitate cryptographic key management controls to protect the confidentiality, integrity and availability of keys?