- only standard algorithms (e.g. AES) are used and that, where possible, products which have received appropriate accreditation are used
- access to cryptographic keys granted strictly on a need to know basis
- ensure that no single person has full knowledge of the encryption keys
- data should be transmitted over a different communication channel than the keys used to govern the cryptographic process
- keys and related keying materials must not be stored anywhere in unencrypted form
- ensure the readable version of any keys are not deleted until receipt and decryption of the encrypted file has been confirmed
Not a blog about plumbing, or Super Mario, but in fact a series of posts about technology, IT and a few other things.
Search This Blog
Thursday, 23 March 2017
Some thoughts on a key management policy
Some thoughts on a key management policy
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment