Data Encryption Policy Template
The encryption key management plan shall ensure data can be decrypted when access to data is necessary.
Data encryption policy template. All data assets utilizing symmetric encryption algorithms shall only do so utilizing cryptographic keys of 112 bits or longer. Encryption products appendix d the value of the data that requires protection and the system storing the data need to be considered carefully. This policy outlines tested and recommended encryption technologies to help secure your corporate data. Encryption offers a means of protecting data in transit or stored on devices but organizations must follow proven methods and adhere to current standards for it to be effective.
The process of disguising plaintext data is called encryption and encrypted data is called ciphertext. Data classification level which include documentation of. Thereby ensuring data can be recovered in the event of loss or unavailability of encryption keys. The purpose of this policy is to provide guidance on the use of encryption technologies to protect lep data information resources and other confidential information or pii while stored at rest or transmitted between parties.
For more information see controlling your data in office 365 using customer key. This policy was created by or for the sans institute for the. You can assign a data encryption policy to a mailbox by using the dataencryptionpolicy parameter on the set mailbox cmdlet in exchange online powershell. Ensuring encryption passwords used to access encrypted devices are not written down on the encrypted device or stored with or near the encrypted device.
This policy defines to whom it applies and under what circumstances and it will include the definition of a breach staff roles and responsibilities standards and metrics eg to enable prioritization of the incidents as well as reporting remediation and feedback mechanisms. Data breach response policy defines the goals and the vision for the breach response process. A acceptable cryptographic key lengths and b acceptable cryptographic algorithms. Ensuring all encryption passwords assigned to them are kept confidential at all times and not shared with others.
Data encryption policy cmdlets are the exchange online part of service encryption with customer key in office 365. Larger key spaces however are recommended for longer term security. Physical security refers to being able to control access to the systems storage media. Reporting all misuse and breaches of this policy to their line manager.
This policy also provides direction to ensure that regulations are followed. Backup or other strategies eg key escrow recovery agents etc shall be implemented to enable decryption. There is no prior approval required.