Table of Contents

Encryption Policy

ACME Evil Anvil Corporation

March 2019 Contents

  1. Purpose and Scope
  2. Background
  3. Policy

Table 1: Control satisfaction

Standard Controls Satisfied
TSC CC9.9

Table 2: Document history

Date Comment
Jun 1 2018 Initial document

1 Purpose and Scope

  1. This policy defines organizational requirements for the use of cryptographic controls, as well as the requirements for cryptographic keys, in order to protect the confidentiality, integrity, authenticity and nonrepudiation of information.
  2. This policy applies to all systems, equipment, facilities and information within the scope of the organization’s information security program.
  3. All employees, contractors, part-time and temporary workers, service providers, and those employed by others to perform work on behalf of the organization having to do with cryptographic systems, algorithms, or keying material are subject to this policy and must comply with it.

2 Background

  1. This policy defines the high level objectives and implementation instructions for the organization’s use of cryptographic algorithms and keys. It is vital that the organization adopt a standard approach to cryptographic controls across all work centers in order to ensure end-to-end security, while also promoting interoperability. This document defines the specific algorithms approved for use, requirements for key management and protection, and requirements for using cryptography in cloud environments.

3 Policy

Table 3: Cryptographic Controls

Name of System/Type of Information Cryptographic Tool Encryption Algorithm Key Size
Public Key Infrastructure for Authentication OpenSSL AES-256 256-bit key
Data Encryption Keys OpenSSL AES-256 256-bit key
Virtual Private Network (VPN) keys OpenSSL and OpenVPN AES-256 256-bit key
Website SSL Certificate OpenSSL, CERT AES-256 256-bit key