A.8.24 Use of cryptography
- Andy Systems
- ISMS Guides
A.8.24 Use of Cryptography would include:
-
Cryptography Policy: Documentation of a formal cryptography policy that outlines the organization's approach to using cryptographic techniques to protect sensitive information and communications.
-
Encryption Algorithms and Protocols: Information about the encryption algorithms and protocols used by the organization, including their strength, suitability for the intended purposes, and compliance with industry standards.
-
Key Management: Documentation of key management practices, including key generation, distribution, storage, rotation, and destruction, to ensure the secure and effective use of cryptographic keys.
-
Digital Certificates: Evidence of the use of digital certificates for secure communication and authentication, along with documentation of certificate management processes.
-
Secure Communication Channels: Documentation of the use of secure communication channels, such as SSL/TLS, to protect data transmitted over networks.
-
Cryptographic Modules: Information about any cryptographic modules or hardware security modules (HSMs) used to perform cryptographic operations, along with evidence of their compliance with industry standards.
-
Cryptographic Controls for Data-at-Rest: Evidence of cryptographic controls used to protect sensitive data stored on devices, databases, or other storage media.
-
Secure Hashing: Documentation of the use of secure hash functions for data integrity verification, password storage, and other purposes.
-
Compliance with Regulations: Evidence that the organization's cryptographic practices align with relevant industry regulations, standards, and best practices.
-
Training and Awareness: Evidence of employee training and awareness programs related to the use of cryptography, ensuring that employees understand how to correctly and securely use cryptographic tools.
-
Cryptography Incident Response: Documentation of incident response procedures for handling cryptographic-related security incidents, such as key compromises or unauthorized access to encrypted data.
-
Periodic Cryptographic Reviews: Records of periodic reviews and audits of the organization's cryptographic practices to ensure that they remain effective and in compliance with the policy and standards.
By reviewing these pieces of evidence, an auditor can assess the organization's implementation of cryptographic controls to protect sensitive information and communications. The goal is to ensure that cryptography is used correctly and securely to safeguard data and maintain the confidentiality, integrity, and authenticity of critical information assets.