You are on page 1of 2

Acceptable Encryption Policy

Created by or for the SANS Institute. Feel free to modify or use for your organization. If you have a
policy to contribute, please send e-mail to stephensans.edu

1.0 Purpose
The purpose of this policy is to provide guidance that limits the use of encryption to those algorithms that
have received substantial public review and have been proven to work effectively. Additionally, this policy
provides direction to ensure that Federal regulations are followed, and legal authority is granted for the
dissemination and use of encryption technologies outside of the United States.

2.0 Scope
This policy applies to all <ompany !ame" employees and affiliates.

3.0 Policy
All <ompany !ame" encryption should use common, well understood ciphers include A#S $%&, Triple
'#S S(A ))) and SS*+T*S. Symmetric cryptosystem key lengths must be at least ,$- bits. Asymmetric
crypto.system keys must be of a length that yields e/uivalent strength. <ompany !ame"0s key length
re/uirements shall be reviewed annually as part of the yearly security review and upgraded as technology
allows.
3.1 What is not allowed
The use of proprietary encryption algorithms are not allowed for any purpose, unless reviewed by
/ualified e1perts outside of the vendor in /uestion and approved by )nfoSec.
The use of 2'%, 'ual #lliptic urve, or #1tended 3andom are not allowed for any purpose,
unless reviewed by /ualified e1perts outside of the vendor in /uestion and approved by )nfoSec.
#1port of encryption technologies is is not allowed from the USA to e1port controlled or
embargoed countries. 3esidents of countries other than the United States should make themselves
aware of the encryption technology laws of the country in which they reside.

4.0 Enforcement
Any employee found to have violated this policy may be sub4ect to disciplinary action, up to and including
termination of employment.
.0 !e"ision #istory
5ersion ,., 6ctober ,,, $7,7, re/uire !)ST approved products
5ersion ,.$ April ,, $7,8, updated based on validation of Snowden disclosures


$.0 %efinitions
&erm %efinition
9roprietary #ncryption An algorithm that has not been made public and+or has not withstood
public scrutiny. The developer of the algorithm could be a vendor, an individual, or the government.

Symmetric ryptosystem A method of encryption in which the same key is used for both
encryption and decryption of the data.
opyright $7,8 SA!S )nstitute
Asymmetric ryptosystem A method of encryption in which two different keys are used: one for
encrypting and one for decrypting the data ;e.g., public.key encryption<.
2'% A message digest commonly used until $77%, structural weakness was
documented in ,==& and practical attacks e1ist
'ual #lliptic urve A method of creating pseudorandom numbers known to have a
significant weakness.
#1tended 3andom A pseudorandom generator that has been demonstrated to have
e1tremely significant problems.

opyright $7,8 SA!S )nstitute

You might also like