Symmetric and asymmetric cryptographic keys must be managed according to approved processes using approved technology to ensure that malicious intruders do not take advantage of any network resource exposure that may occur as a result of non-standard practices and tools being applied. Therefore, apps involved in the production, control, and distribution of both symmetric and asymmetric cryptographic keys must use NIST approved or NSA-approved key management technology and processes. If non-standard practices are applied to key management, then the DoD is potentially vulnerable to attack from adversaries who are able to exploit weak encryption keys.