CEK-04: Are appropriate data protection encryption algorithms used that consider data
classification, associated risks, and encryption technology usability?
A risk-based approach to encryption algorithms adoption should consider, but not be limited to: a. Cryptographic key management system algorithms should not exceed the anticipated lifetime of the CKMS and the information it protects. b. Cryptographic key management system security policies should protect the confidentiality, integrity, availability, and source authentication of all keys, algorithms, and metadata. c. The (CKMS) should include, but is not limited to: Approved algorithms Hardware security modules (HSMs) Key sizes d. The adoption of the appropriate key size and algorithm types should be done based on cost-benefit analysis and the level of risk to data (please see the reference to quantum-resistant encryption in CEK-03).
Control implemented
Control ownership
Description
Use encryption algorithms that are appropriate for data protection,
considering the classification of data, associated risks, and usability of the
encryption technology.