Cryptography Policy

Version

1.1

Owner

CTO

Last Updated on

Sep 1, 2022

Last Updated by

@Daniel Alexander

Approved by

@Raphael Santos

Last Review

Jan 21, 2024

Purpose

To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. This policy establishes requirements for the use and protection of cryptographic keys throughout their entire lifecycle.

Scope

All information systems developed and/or controlled by ecoPortal which store or transmit confidential data.

For any questions relating to this document or our Security & Privacy, please contact us at issues@ecoportal.co.nz


Policy

ecoPortal shall evaluate the risks inherent in processing and storing data, and shall implement cryptographic controls to mitigate those risks where deemed appropriate. Where encryption is in use, strong cryptography with associated key management processes and procedures shall be implemented and documented. All encryption shall be performed in accordance with industry standards, including NIST SP 800-57.

For all personal data, ecoPortal shall consider the state of the art, the costs of implementation and the nature, scope, context, and purposes of processing as well as the risk of varying likelihood and severity to the rights and freedoms of natural persons, and implement appropriate technical and organizational measures surrounding the pseudonymization and encryption of data to ensure a level of security appropriate to the risk.

For all web traffic sent over the public Internet containing confidential, the TLS v1.3 protocol or better must be utilized.

Key Management

Access to keys and secrets shall be tightly controlled in accordance with the Access Control Policy.

The following table includes the recommended usage for cryptographic keys:

Domain

Key Type

Algorithm

Key Length

Max Expiration

Domain

Key Type

Algorithm

Key Length

Max Expiration

Web Certificate

Digital Signature

DSA or RSA PCKS#1

2048 bit

Up to 2 years for normal certificates, up to 10 years for root certificates.

Web Cipher

Encryption

AES

256 bit

N/A

Confidential

Encryption

AES

256 bit

1 Year

Password

Hash

Bcrypt, PBKDF2, or scrypt, ECDH

256 bit+10K Stretch

N/A

Laptop HDD

Encryption

AES

128 or 256 bit

N/A

Exceptions

Requests for an exception to this policy must be submitted to @Raphael Santos for approval.

Violations & Enforcement

Any known violations of this policy should be reported to @Raphael Santos. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.