1. Introduction
The Encryption and Key Management Policy establishes the standards and practices for encrypting and managing cryptographic keys to ensure the confidentiality, integrity, and availability of data within Igile Technologies India Pvt Ltd. This policy is designed to safeguard sensitive information from unauthorized access and tampering.
2. Objectives
- To ensure all data is encrypted both in transit and at rest.
- To define and manage encryption standards and practices for secure data handling.
- To ensure proper handling and management of cryptographic keys.
- To establish procedures for the use of digital certificates for authentication and secure communications.
3. Scope
This policy applies to all employees, contractors, and third-party service providers who handle or manage data, encryption, and cryptographic keys within Igile Technologies India Pvt Ltd.
4. Data Encryption Standards
- Data at Rest:
- Algorithm: AES (Advanced Encryption Standard) with a minimum key length of 256 bits.
- Implementation: All sensitive data stored in databases, file systems, and backup storage must be encrypted using AES-256.
- Data in Transit:
- Protocol: TLS (Transport Layer Security) version 1.2 or higher.
- Implementation: All communications over networks, including web applications and APIs, must use TLS to encrypt data in transit.
- Data in Use:
- Algorithm: Data should be protected using in-memory encryption where applicable.
- Implementation: Sensitive data processed in-memory should be encrypted to prevent unauthorized access.
5. Encoding
- Purpose: Encoding is used to ensure data integrity during transmission and to encode binary data for secure exchanges.
- Method:
- Base64 Encoding: Used for encoding binary data into ASCII text to ensure safe transport over text-based protocols.
- Implementation: All data that needs to be transferred or logged must be encoded using Base64 to maintain integrity and prevent data corruption.
6. Digital Certificates
- Issuance:
- Certificate Authority: Certificates must be issued by a reputable Certificate Authority (CA).
- Types: Use of SSL/TLS certificates for secure web communications, and code-signing certificates for software integrity.
- Validation:
- Regular Checks: Validate certificates regularly to ensure they are still valid and have not been revoked.
- Renewal: Renew certificates before their expiration date to avoid disruption in service.
- Revocation:
- Process: Immediately revoke certificates if a compromise is detected or if an employee’s access changes.
7. Algorithms
- Cryptographic Algorithms:
- Symmetric Algorithms: AES (Advanced Encryption Standard) for encryption.
- Asymmetric Algorithms: RSA (Rivest-Shamir-Adleman) or ECC (Elliptic Curve Cryptography) for key exchange and digital signatures.
- Selection: Algorithms must meet current industry standards and best practices as recommended by organizations such as NIST (National Institute of Standards and Technology).
- Implementation: Ensure algorithms are implemented correctly and securely within applications, avoiding deprecated or insecure algorithms.
8. Key Management
- Key Generation:
- Algorithm: Use cryptographically secure methods for key generation.
- Key Length: Ensure key lengths are adequate to provide security (e.g., 256 bits for AES).
- Key Storage:
- Hardware Security Modules (HSMs): Use HSMs or secure key vaults to store encryption keys.
- Access Controls: Limit access to key storage systems to authorized personnel only.
- Key Rotation:
- Frequency: Rotate encryption keys regularly based on the sensitivity of the data and industry standards.
- Process: Implement automated key rotation mechanisms where possible.
- Key Destruction:
- Procedure: Ensure secure destruction of keys that are no longer in use or have been replaced.
- Verification: Verify that keys are irreversibly destroyed to prevent unauthorized access.
9. Integrations and Authorizations
- Integration Security:
- Encryption: Apply encryption standards to secure data exchanges between systems and third-party services.
- API Security: Use OAuth, API keys, or other secure methods for authentication and authorization in APIs.
- Authorization:
- Access Control: Ensure that only authorized users have access to sensitive data and cryptographic keys.
- Auditing: Implement logging and monitoring to track access to encryption keys and data.
10. Compliance and Review
- Compliance: Ensure adherence to applicable regulations, standards, and best practices related to data encryption and key management.
- Review: Regularly review and update the Encryption and Key Management Policy to address emerging threats and changes in technology.
11. Responsibilities
- IT Security Team: Responsible for implementing and maintaining encryption standards and key management practices.
- Compliance Officer: Ensures policy compliance and manages audits and assessments.
- Employees: Must adhere to encryption practices and report any security incidents related to data protection.
12. References
- NIST Special Publication 800-53: Security and Privacy Controls for Information Systems and Organizations
- ISO/IEC 27001: Information Security Management Systems