- only standard algorithms (e.g. AES) are used and that, where possible, products which have received appropriate accreditation are used
 - access to cryptographic keys granted strictly on a need to know basis
 - ensure that no single person has full knowledge of the encryption keys
 - data should be transmitted over a different communication channel than the keys used to govern the cryptographic process
 - keys and related keying materials must not be stored anywhere in unencrypted form
 - ensure the readable version of any keys are not deleted until receipt and decryption of the encrypted file has been confirmed
 
Not a blog about plumbing, or Super Mario, but in fact a series of posts about technology, IT and a few other things.
Search This Blog
Thursday, 23 March 2017
Some thoughts on a key management policy
Some thoughts on a key management policy
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment