Cryptography Implementation Plan - Redback Operations
Author: Ali Demirovski
Cryptography For Redback Operations
- Purpose: Protection and confidentiality of data and files, ensuring the safety of communication, and maintaining authorized access only.
Encryption Standards:
-
Advanced Encryption Standard (AES):
- Symmetric encryption algorithm, using the same key for both encryption and decryption.
- One of the most widely used encryption standards globally.
-
ISO/IEC 19790:2012:
- This standard outlines how encryption is implemented, including authentication, testing, and configuration management.
-
ISO/IEC 24759:2017:
- Covers the impartial testing process of cryptographic modules, ensuring rigorous and unbiased results.
Classification Levels:
1. Open/Public:
- Data accessible and editable by anyone.
- No encryption is required for this data classification.
2. Private/Confidential:
- Data that is sensitive and limited to authorized personnel.
- Requires encryption to maintain data privacy and security.
- Employees must distinguish between public and private data to ensure correct usage of encryption.
Encryption Software:
1. VeraCrypt:
- Cost-free encryption software that supports multiple algorithms like AES and Serpent.
- Offers strong protection but may be difficult to use for beginners.
2. BitLocker:
- Full disk encryption solution for Windows devices.
- Easy to use, but limited to Windows platforms.
3. NordLocker:
- User-friendly encryption solution supporting both Windows and macOS.
- File-by-file encryption; subscription-based with strong security.
4. AxCrypt:
- Subscription-based software with a free version for trial.
- Easy to use, offers file-by-file encryption with password protection.
Expected Users and Devices:
- The plan applies company-wide, particularly focusing on developers.
- Devices covered include all company-issued personal devices (laptops, mobile phones) and Raspberry Pi hardware.
Regulatory Compliance:
- Regular audits will ensure that encryption standards are followed.
- Compliance with ISO standards will be key in passing external audits and company reviews.
References:
- Encryption Standards:
- Encryption Software: