Defines security requirements and implementation methods for each step in the key life cycle, applicable to keys at all levels of a key hierarchy. Applies to those institutions responsible for key management for protection of data in transactions originated by bank cards.