To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. This policy establishes requirements for the use and protection of cryptographic keys throughout their entire lifecycle.
All information systems developed and/or controlled by ecoPortal which store or transmit confidential data.
For any questions relating to this document or our Security & Privacy, please contact us at email@example.com
ecoPortal shall evaluate the risks inherent in processing and storing data, and shall implement cryptographic controls to mitigate those risks where deemed appropriate. Where encryption is in use, strong cryptography with associated key management processes and procedures shall be implemented and documented. All encryption shall be performed in accordance with industry standards, including NIST SP 800-57.
For all personal data, ecoPortal shall consider the state of the art, the costs of implementation and the nature, scope, context, and purposes of processing as well as the risk of varying likelihood and severity to the rights and freedoms of natural persons, and implement appropriate technical and organizational measures surrounding the pseudonymization and encryption of data to ensure a level of security appropriate to the risk.
For all web traffic sent over the public Internet containing confidential, the TLS v1.3 protocol or better must be utilized.
Access to keys and secrets shall be tightly controlled in accordance with the Access Control Policy.
The following table includes the recommended usage for cryptographic keys:
DSA or RSA PCKS#1
Up to 2 years for normal certificates, up to 10 years for root certificates.
Bcrypt, PBKDF2, or scrypt, ECDH
256 bit+10K Stretch
128 or 256 bit
Requests for an exception to this policy must be submitted to @Raphael Santos for approval.
Violations & Enforcement
Any known violations of this policy should be reported to @Raphael Santos. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.