0% found this document useful (0 votes)
34 views7 pages

(UnderDefense MAXI) - Encryption Policy

Uploaded by

csservices.nm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views7 pages

(UnderDefense MAXI) - Encryption Policy

Uploaded by

csservices.nm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

UnderDefense policy template kit

Starting your compliance journey? UnderDefense policy template offers a comprehensive and
compliance-ready document, complete with placeholders for company-specific details.

How to use this document


1. Thoroughly review the content of each policy, analyzing it section by section.
2. Evaluate whether the subsequent section and its associated risks are applicable to you.
If it does not, remove it and/or replace it with your organization’s corresponding
practices.
3. Replace any highlighted text in angled brackets < >1 with appropriate information (Use
Find to make sure that all text in angled brackets is replaced)
4. Remove this instructions page
5. Add any company-specific letterhead, branding, and formatting
6. Save this document as PDF and upload to UnderDefenseMAXI to
https://app.underdefense.com/compliance/ISO27001/approved-policies

1 All fields in this document marked by angled brackets < > and highlighted must be filled in.
The Path to Compliance
We'll guide you through, ensuring a smooth path to compliance:

SOC 2 Certification Timeline for SMBs with 50-250 Employees

Need Expert Assistance?


Navigating the complexities of compliance
can be challenging, especially for businesses
with limited internal resources or expertise.
➔ Experience team at the right time
➔ Preparation of all compliance docs
➔ Expert guidance on all tech-related
issues Take your compliance from
probable to guaranteed.
Book a call with expert
<Company> Encryption Policy 1
This document is for internal use only
<Your Company Logo>
Encryption Policy

<Company> Encryption Policy 2


This document is for internal use only
Version Control Table
Version Date Author Description

1.0 <Date> <Author> Issued

1.0 <Date> <Author> Reviewed

1.0 <Date> <Author> Approved

1.0 <Date> <Author> Granted “FINAL” status

Date of Next Revision <date>

This policy will be reviewed for continued completeness, relevance, and accuracy within 1 year
of being granted “final” status and at yearly intervals after that.

The version control table will show the published update date and provide a thumbnail of the
significant change. CAUTION: the thumbnail is not intended to summarize the difference and is
not a substitute for reading the full text.

<Company> Encryption Policy 3


This document is for internal use only
Table of Contents
The Path to Compliance

We'll guide you through, ensuring a smooth path to compliance:

Need Expert Assistance?

Version Control Table

Table of Contents

Purpose

Scope

Policy

Encryption Strategy

Encryption of Data at Rest

Encryption Key Management

Disciplinary actions

Change, Review, and Update

Responsibility

Reference

Related Documents

<Company> Encryption Policy 4


This document is for internal use only
Purpose
The purpose of this policy is to outline the <Company> standards for the use of encryption
technology so that it is used securely and managed appropriately.

Scope
This policy covers all data stored on or transmitted across corporate systems.

Policy
Encryption Strategy
The following represents the <Company> encryption strategy:

● If disk encryption is used, logical access should be managed independently of native


operating system access control mechanisms.
● All information must be encrypted by communication protocols such as HTTPS/TLS1.2
(or higher) when transmitted outside of our company.
● Using only laptops and desktops that have encrypted hard drives.
● Decryption keys should not be tied to user accounts.
● Protect cryptographic keys used for encryption of confidential data against disclosure
and misuse.
● Restrict access to cryptographic keys to the fewest number of custodians necessary.
● Store cryptographic keys securely in the fewest possible locations and forms.
● Generate strong cryptographic keys to protect confidential data.
● Secure cryptographic key distribution.
● Secure cryptographic key storage.
● Perform cryptographic key rotation periodically.

Encryption of Data at Rest


Encryption of data at rest is required to store confidential data, such as any data located on
company-owned or company-provided systems, devices, media, etc. This includes the following
options for stored data:

● Whole disk encryption


● Encryption of partitions/files
● Encryption of disk drives
● Encryption of backups
● Database encryption

<Company> Encryption Policy 5


This document is for internal use only
Encryption Key Management
The following recommendations apply to the Company private SSH keys.

● Management of keys must ensure that data is available for decryption when needed.
● Keys must be backed up.
● Keys must be securely stored.
● Keys must be protected through their whole life cycle against modification, loss,
unauthorized access/use or disclosure.
● Keys must never be transmitted in cleartext.
● Keys are to be treated as confidential data.
● Keys must not be shared.
● Keys must be used and changed at a minimum annually.

Disciplinary actions
Employees who violate this policy may face disciplinary consequences in proportion to their
violation. Management will determine how severe an employee’s offense is and take the
appropriate action.

Change, Review, and Update


This policy shall be reviewed once every year unless the owner considers an earlier review
necessary to ensure that the policy remains current. Changes to this policy shall be exclusively
performed by the ISMS Manager and approved by the ISMS Committee.

Responsibility
This is the responsibility of the ISMS Manager to maintain and make sure everyone is aware of
this policy.

Reference
● ISO 27001 A.10.1.1 Policy on the Use of Cryptographic Controls
● ISO 27001 A.10.1.2 Key Management

Related Documents

<Company> Encryption Policy 6


This document is for internal use only

You might also like