Aarna Cybernetics Information Security Encryption Policy v0.1
Aarna Cybernetics Information Security Encryption Policy v0.1
1. Purpose.......................................................................................................................2
2. Scope...........................................................................................................................2
3. Policy Framework......................................................................................................2
4. Risk Appetite..............................................................................................................2
5. Policy Statement.......................................................................................................2
5.1. Encryption Standards...................................................................................2
5.2. Encryption on data at rest...........................................................................2
5.3. Encryption on data in transit......................................................................2
5.4. Encryption Keys and Recovery...................................................................3
5.5. Compliance....................................................................................................3
5.6. Exceptions......................................................................................................3
6. Roles and Responsibilities.......................................................................................3
7. Document Review.....................................................................................................4
8. Related Documents..................................................................................................4
9. Document Version History......................................................................................4
1. Purpose
2. Scope
This policy applies to all employees, contractors, volunteers, visitors, and other
workers.
3. Policy Framework
This policy forms part of a set of policies designed to manage business risk and
should be considered in conjunction with the other relevant policies in the
framework below:
4. Risk Appetite
5. Policy Statement
5.1.Encryption Standards
The company uses encryption software and services that meet the
recommendations of the National Cyber Security Centre (NCSC) and other
security organisations and has no known exploitable vulnerabilities.
All desktops, laptops and devices where possible should have full disk
encryption.
Disk encryption software used:
* {List encryption solutions here}
File Storage Encryption
* {Conditions for file storage here}
5.3.Encryption on data in transit
All encryption keys, recovery keys, IDs, signing requests and cryptographic
components must be documented and stored both physically in a secure fire
proof safe; and electronically within a secure encrypted store and not within
individuals’ encrypted volumes.
5.5.Compliance
Compliance to this policy will be audited through various methods, including but
not limited to, periodic training, video monitoring, business reports, internal and
external audits, and feedback to the policy owner.
An employee found to have violated this policy may be subject to disciplinary
action, up to and including termination of employment.
5.6.Exceptions
Any exception to the policy must be approved by the [IT Decision Maker] in
advance.
7. Document Review
8. Related Documents
Versi
Date Author Notes
on
11-11-2023 Pritam V1
Bajpai