Security Policy
  • Data Protection Standard
  • General
    • Acceptable Encryption Policy
    • Acceptable Use Policy
    • Data Breach Response Policy
    • Data Classification Policy
    • Disaster Recovery Plan Policy
    • Email Policy
    • Password Construction Guidelines
    • Password Protection Policy
    • Security Response Plan Policy
  • Network Security
    • Remote Access Policy
    • Remote Access Tools Policy
  • Server Security
    • Database Credentials Coding Policy
    • Information Logging Standard
    • Server Security Policy
Powered by GitBook
On this page
  • 1. Overview
  • 2. Purpose
  • 3. Scope
  • 4. Policy
  • 4.1 Algorithm Requirements
  • 4.2 Hash Function Requirements
  • 4.3 Key Agreement and Authentication
  • 4.4 Key Generation
  • 5. Policy Compliance
  • 5.1 Compliance Measurement
  • 5.2 Exceptions
  • 5.3 Non-Compliance
  • 6. Related Standards, Policies and Processes
  • 7. Definitions and Terms
  • 8. Revision History

Was this helpful?

  1. General

Acceptable Encryption Policy

PreviousData Protection StandardNextAcceptable Use Policy

Last updated 4 years ago

Was this helpful?

1. Overview

See .

2. Purpose

The purpose of this policy is to provide guidance that limits the use of encryption to those algorithms that have received substantial public review and have been proven to work effectively. Additionally, this policy provides direction to ensure that regulations are followed, and legal authority is granted for the dissemination and use of encryption technologies.

3. Scope

This policy applies to all GetCraft employees and affiliates.

4. Policy

4.1 Algorithm Requirements

  1. Ciphers in use must meet or exceed the set defined as "AES-compatible" or "partially AES-compatible" according to the , or the set defined for use in the United States , or any superseding documents according to the date of implementation. The use of the Advanced Encryption Standard (AES) is strongly recommended for symmetric encryption.

  2. Algorithms in use must meet the standards defined for use in NIST publication or any superseding document, according to date of implementation. The use of the RSA and Elliptic Curve Cryptography (ECC) algorithms is strongly recommended for asymmetric encryption.

  3. Signature Algorithms

Algorithm

Key Length (min)

Additional Comment

ECDSA

P-256

RSA

2048

LDWM

SHA256

4.2 Hash Function Requirements

4.3 Key Agreement and Authentication

  1. Key exchanges must use one of the following cryptographic protocols: Diffie-Hellman, IKE, or Elliptic curve Diffie-Hellman (ECDH).

  2. End points must be authenticated prior to the exchange or derivation of session keys.

  3. Public keys used to establish trust must be authenticated prior to use. Examples of authentication include transmission via cryptographically signed message or manual verification of the public key hash.

  4. All servers used for authentication must have installed a valid certificate signed by a known trusted provider.

  5. All servers and applications using SSL or TLS must have the certificates signed by a known, trusted provider.

4.4 Key Generation

  1. Cryptographic keys must be generated and stored in a secure manner that prevents loss, theft, or compromise.

5. Policy Compliance

5.1 Compliance Measurement

The DevSecOps team will verify compliance to this policy through various methods.

5.2 Exceptions

Any exception to the policy must be approved by the DevSecOps team in advance.

5.3 Non-Compliance

An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.

6. Related Standards, Policies and Processes

7. Definitions and Terms

  • Proprietary Encryption

8. Revision History

Date of Change

Responsible

Summary of Change

October 2020

GetCraft DevSecOps Team

Initial version

Consider to avoid patent infringement.

Must use a secure padding scheme. is recommended. Message hashing required.

Refer to

In general, GetCraft adheres to the .

Key generation must be seeded from an industry standard random number generator (RNG). For examples, see .

The following definition and terms can be found in the SANS Glossary located at:

Purpose
IETF/IRTF Cipher Catalog
National Institute of Standards and Technology (NIST) publication FIPS 140-2
FIPS 140-2
NIST Policy on Hash Functions
NIST Annex C: Approved Random Number Generators for FIPS PUB 140-2
National Institute of Standards and Technology (NIST) publication FIPS 140-2
NIST Policy on Hash Functions
https://www.sans.org/security-resources/glossary-of-terms
RFC6090
PKCS#7 padding scheme
LDWM Hash-based Signatures Draft