web analytics

Encryption Policy – Source: www.techrepublic.com

Rate this post

Source: www.techrepublic.com – Author:

Encryption is vital for securing data, whether in transit or stored on devices. It can provide peace of mind that communications will not be intercepted and that sensitive information stored on devices can’t be exfiltrated in the event of loss or theft.

This policy from TechRepublic Premium provides guidelines for adopting encryption technologies for organizational use that have undergone extensive technical review, are not encumbered by patents or copyright and have been proven to work reliably.

From the policy:

ALGORITHM REQUIREMENTS

Ciphers that are proven, standard, highly tested and free of patent encumbrances must be used as the basis for encrypting devices and communications. They must meet the requirements delineated in the National Institute of Standards and Technology’s Federal Information Processing Standards. While the Advanced Encryption Standard is highly recommended, the AES-compatible ciphers ARIA, CAST-256, Camellia, Serpent and Twofish are also acceptable for use.

The download comprises a six-page PDF and Word document.

Previously priced at $99, this is now available to download for $19. Or free with Premium annual subscription: click here to find out more.

Original Post URL: https://www.techrepublic.com/resource-library/whitepapers/encryption-policy/

Category & Tags: IT Policies,Security,TechRepublic Premium – IT Policies,Security,TechRepublic Premium

Views: 1

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post