Expert Advice Community

Guest

Cryptography Controls

  Quote
Guest
Guest user Created:   Apr 14, 2020 Last commented:   Apr 14, 2020

Cryptography Controls

Can you explain the implementation of cryptography control?

1. Which areas we need to implement in an organization.

2. Example of encryption and decryption policies.

0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Apr 14, 2020

1. Which areas we need to implement in an organization.

According to ISO 27001, the application of a control (in your case, the areas where you need to implement cryptography) must be based on the results of risk assessment, applicable legal requirements (e.g., laws, regulations, or contracts), and/or in decision of top management.

Broadly speaking, areas with identified needs to protect the confidentiality and integrity of communications channels and information, would the most probable areas to implement cryptography control.

For example, you can use cryptography control to encryption of sensitive data sent over email or through removable media, or to digitally sign a document, ensuring you are the author of the document or that it was not changed.

 For further information see:

2. Example of encryption and decryption policies.

To see how an encryption policy looks like, I suggest you t take a look at this free demo: Policy on the Use of Encryption https://advisera.com/27001academy/documentation/policy-on-the-use-of-encryption/

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Apr 14, 2020

Apr 14, 2020

Suggested Topics

Guest user Created:   Dec 06, 2017 ISO 27001 & 22301
Replies: 1
0 0

Cryptography controls

Guest user Created:   Aug 01, 2023 ISO 27001 & 22301
Replies: 1
0 0

Documentation package content