0% found this document useful (0 votes)
507 views3 pages

Acceptable Encryption Policy

The document provides guidance on acceptable encryption policies for organizations. It outlines requirements for encryption algorithms, hash functions, key agreement and authentication protocols. It also discusses policy compliance and exceptions.

Uploaded by

Boris Johnson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
507 views3 pages

Acceptable Encryption Policy

The document provides guidance on acceptable encryption policies for organizations. It outlines requirements for encryption algorithms, hash functions, key agreement and authentication protocols. It also discusses policy compliance and exceptions.

Uploaded by

Boris Johnson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Consensus Policy Resource Community

Acceptable Encryption Policy


Free Use Disclaimer: This policy was created by or for the SANS Institute for the
Internet community. All or parts of this policy can be freely used for your organization.
There is no prior approval required. If you would like to contribute a new policy or
updated version of this policy, please send email to [email protected].
Things to Consider: Please consult the Things to Consider FAQ for additional
guidelines and suggestions for personalizing the SANS policies for your organization.
Last Update Status: Updated June 2014

1. Overview
See Purpose.

2. Purpose
The purpose of this policy is to provide guidance that limits the use of encryption to those
algorithms that have received substantial public review and have been proven to work
effectively. Additionally, this policy provides direction to ensure that Federal regulations are
followed, and legal authority is granted for the dissemination and use of encryption technologies
outside of the United States.

3. Scope
This policy applies to all <Company Name> employees and affiliates.

4. Policy
4.1 Algorithm Requirements
4.1.1 Ciphers in use must meet or exceed the set defined as "AES-compatible" or
"partially AES-compatible" according to the IETF/IRTF Cipher Catalog, or the set
defined for use in the United States National Institute of Standards and
Technology (NIST) publication FIPS 140-2, or any superseding documents
according to the date of implementation. The use of the Advanced Encryption
Standard (AES) is strongly recommended for symmetric encryption.
4.1.2 Algorithms in use must meet the standards defined for use in NIST publication
FIPS 140-2 or any superseding document, according to date of implementation.
The use of the RSA and Elliptic Curve Cryptography (ECC) algorithms is
strongly recommended for asymmetric encryption.
4.1.3 Signature Algorithms
Algorithm

Key Length
(min)

SANS Institute 2014 All Rights Reserved

Additional Comment

Page 1

Consensus Policy Resource Community

ECDSA

P-256

RSA

2048

LDWM

SHA256

Cisco Legal recommends RFC6090 compliance


to avoid patent infringement.
Must use a secure padding scheme. PKCS#7
padding scheme is recommended. Message
hashing required.
Refer to LDWM Hash-based Signatures Draft

4.2
Hash Function Requirements
In general, <Company Name> adheres to the NIST Policy on Hash Functions.
4.3 Key Agreement and Authentication
4.3.1

Key exchanges must use one of the following cryptographic protocols: DiffieHellman, IKE, or Elliptic curve Diffie-Hellman (ECDH).

4.3.2

End points must be authenticated prior to the exchange or derivation of session


keys.

4.3.3

Public keys used to establish trust must be authenticated prior to use. Examples
of authentication include transmission via cryptographically signed message or
manual verification of the public key hash.

4.3.4

All servers used for authentication (for example, RADIUS or TACACS) must
have installed a valid certificate signed by a known trusted provider.

4.3.5

All servers and applications using SSL or TLS must have the certificates signed
by a known, trusted provider.

4.4 Key Generation


4.4.1

Cryptographic keys must be generated and stored in a secure manner that prevents
loss, theft, or compromise.

4.4.2

Key generation must be seeded from an industry standard random number


generator (RNG). For examples, see NIST Annex C: Approved Random Number
Generators for FIPS PUB 140-2.

5. Policy Compliance
5.1 Compliance Measurement

SANS Institute 2014 All Rights Reserved

Page 2

Consensus Policy Resource Community

The Infosec team will verify compliance to this policy through various methods, including but
not limited to, business tool reports, internal and external audits, and feedback to the policy
owner.
5.2 Exceptions
Any exception to the policy must be approved by the Infosec team in advance.
5.3 Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to and
including termination of employment.

6 Related Standards, Policies and Processes


National Institute of Standards and Technology (NIST) publication FIPS 140-2,
NIST Policy on Hash Functions

7 Definitions and Terms


The following definition and terms can be found in the SANS Glossary located at:
https://www.sans.org/security-resources/glossary-of-terms/

Proprietary Encryption

8 Revision History
Date of
Change

Responsible

Summary of Change

June 2014

SANS Policy Team

Updated and converted to new format.

SANS Institute 2014 All Rights Reserved

Page 3

You might also like