This is the multi-page printable view of this section. Click here to print.

Return to the regular view of this page.

End-to-End Encryption

1 - Encryption Standards

  • Data in Transit: Maintain TLS 1.2 or higher for all connections.
  • Data at Rest: Use AES-256 encryption.
  • Compliance: Align with security frameworks like ISO 27001 for best practices.

2 - Key Management Procedures

  • Secure Storage: Safeguard cryptographic keys in hardware security modules or encrypted vaults.
  • Key Rotation: Update keys on a timed schedule or after critical staff changes.
  • Access Controls: Restrict decryption privileges to authorized personnel only.