(UnderDefense MAXI) - Encryption Policy
(UnderDefense MAXI) - Encryption Policy
Starting your compliance journey? UnderDefense policy template offers a comprehensive and
compliance-ready document, complete with placeholders for company-specific details.
1 All fields in this document marked by angled brackets < > and highlighted must be filled in.
The Path to Compliance
We'll guide you through, ensuring a smooth path to compliance:
This policy will be reviewed for continued completeness, relevance, and accuracy within 1 year
of being granted “final” status and at yearly intervals after that.
The version control table will show the published update date and provide a thumbnail of the
significant change. CAUTION: the thumbnail is not intended to summarize the difference and is
not a substitute for reading the full text.
Table of Contents
Purpose
Scope
Policy
Encryption Strategy
Disciplinary actions
Responsibility
Reference
Related Documents
Scope
This policy covers all data stored on or transmitted across corporate systems.
Policy
Encryption Strategy
The following represents the <Company> encryption strategy:
● Management of keys must ensure that data is available for decryption when needed.
● Keys must be backed up.
● Keys must be securely stored.
● Keys must be protected through their whole life cycle against modification, loss,
unauthorized access/use or disclosure.
● Keys must never be transmitted in cleartext.
● Keys are to be treated as confidential data.
● Keys must not be shared.
● Keys must be used and changed at a minimum annually.
Disciplinary actions
Employees who violate this policy may face disciplinary consequences in proportion to their
violation. Management will determine how severe an employee’s offense is and take the
appropriate action.
Responsibility
This is the responsibility of the ISMS Manager to maintain and make sure everyone is aware of
this policy.
Reference
● ISO 27001 A.10.1.1 Policy on the Use of Cryptographic Controls
● ISO 27001 A.10.1.2 Key Management
Related Documents
●