6. TECHNICAL SECURITY CONTROLS6. TECHNICAL SECURITY CONTROLS 6.1 Key pair generation and installation6.2 Private Key Protection and Cryptographic Module Engineering Controls6.3 Other aspects of key pair management6.4 Activation data6.5 Computer security controls6.6 Life cycle technical controls6.7 Network security controls6.8 Time-stamping