5. Cryptography
5.1 Cryptographic controls
5.1.1 Policy on the use of cryptographic controls
A policy on the use of cryptographic controls for protection of information should be developed and implemented.
- Consider the following when developing a cryptographic policy:
a) the management approach towards the use of cryptographic controls across the organization, including the general principles under which business information should be protected;
b) based on a risk assessment, the required level of protection should be identified taking into account the type, strength and quality of the encryption algorithm required;
c) the use of encryption for protection of information transported by mobile or removable media devices or across communication lines;
d) the approach to key management, including methods to deal with the protection of cryptographic keys and the recovery of encrypted information in the case of lost, compromised or damaged keys;
e) roles and responsibilities, e.g. who is responsible for the implementation of the policy and the key management, including key generation.
5.1.2 Key management
A policy on the use, protection and lifetime of cryptographic keys should be developed and implemented through their whole lifecycle.
- Develop a policy that includes requirements for managing cryptographic keys though their whole lifecycle including generating, storing, archiving, retrieving, distributing, retiring and destroying keys.
- Select cryptographic algorithms, key lengths and usage practices according to best practice.
- Protect all cryptographic keys against modification and loss. In addition, secret and private keys need protection against unauthorized use as well as disclosure.
- Protect physically the equipment used to generate, store and archive keys.
- Implement a key management system based on an agreed set of standards, procedures and secure methods for:
a) generating keys for different cryptographic systems and different applications;
b) issuing and obtaining public key certificates;
c) distributing keys to intended entities, including how keys should be activated when received;
d) storing keys, including how authorized users obtain access to keys;
e) changing or updating keys including rules on when keys should be changed and how this will be done;
f) dealing with compromised keys;
g) revoking keys including how keys should be withdrawn or deactivated, e.g. when keys have been compromised or when a user leaves an organization (in which case keys should also be archived);
h) recovering keys that are lost or corrupted;
i) backing up or archiving keys;
j) destroying keys;
k) logging and auditing of key management related activities. - In order to reduce the likelihood of improper use, define activation and deactivation dates for keys so that the keys can only be used for the period of time defined in the associated key management policy.