Acceptable Encryption Policy
Last updated
Was this helpful?
Last updated
Was this helpful?
See .
The purpose of this policy is to provide guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively. Additionally, this policy provides direction to ensure that regulations are followed, and legal authority is granted for the dissemination and use of encryption technologies.
This policy applies to all GetCraft employees and affiliates.
Ciphers in use must meet or exceed the set defined as "AES-compatible" or "partially AES-compatible" according to the , or the set defined for use in the United States , or any superseding documents according to the date of implementation. The use of the Advanced Encryption Standard (AES) is strongly recommended for symmetric encryption.
Algorithms in use must meet the standards defined for use in NIST publication or any superseding document, according to date of implementation. The use of the RSA and Elliptic Curve Cryptography (ECC) algorithms is strongly recommended for asymmetric encryption.
Signature Algorithms
Algorithm
Key Length (min)
Additional Comment
ECDSA
P-256
RSA
2048
LDWM
SHA256
Key exchanges must use one of the following cryptographic protocols: Diffie-Hellman, IKE, or Elliptic curve Diffie-Hellman (ECDH).
End points must be authenticated prior to the exchange or derivation of session keys.
Public keys used to establish trust must be authenticated prior to use. Examples of authentication include transmission via cryptographically signed message or manual verification of the public key hash.
All servers used for authentication must have installed a valid certificate signed by a known trusted provider.
All servers and applications using SSL or TLS must have the certificates signed by a known, trusted provider.
Cryptographic keys must be generated and stored in a secure manner that prevents loss, theft, or compromise.
The DevSecOps team will verify compliance to this policy through various methods.
Any exception to the policy must be approved by the DevSecOps team in advance.
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
Proprietary Encryption
Date of Change
Responsible
Summary of Change
October 2020
GetCraft DevSecOps Team
Initial version
Consider to avoid patent infringement.
Must use a secure padding scheme. is recommended. Message hashing required.
Refer to
In general, GetCraft adheres to the .
Key generation must be seeded from an industry standard random number generator (RNG). For examples, see .
The following definition and terms can be found in the SANS Glossary located at: