Cryptography Implementation - ISP-I7
Cryptography Implementation - ISP-I7
IMPLEMENTATION DETAILS
Policy: ISP-I7
Title: Cryptography Implementation
Status: Approved
1. Introduction
1.1. This document gives additional details about implementing the policies stated in
Cryptography Policy (ISP-S16). How use of encryption will be supported, facilities
available and some guidance for computer support staff is outlined below.
1.2. IT Services will work with departmental computing staff to assist members of the
University that have a requirement to use encryption in their work. An explanation of
where using cryptography is required, or may be appropriate, is given in “Cryptography
Policy (ISP-S16)”.
1.3. Specific details are to be made available, e.g. via the Web, of currently recommended
encryption solutions and whether they are supported by IT Services or within departments.
1.4. It will be practical for computing staff to support a limited range of encryption solutions.
However; other encryption solutions that meet all necessary requirements may be used.
1.5. The encryption technology to be used for a particular purpose must comply with
requirements of an external body where applicable, and at least be deemed suitable by
the University.
1.6. Minimum cryptography standards suitable for general University use, at the time of
writing, are outlined in this document. (This document should be revised periodically.)
2. Encryption of data in general
2.1. Where it is required to encrypt personal or sensitive data, encryption must be:
Either to the standard specified in an agreement between the University and an
external organisation relating to the data in question or,
Where another organisation has not specified any encryption requirements the
data must be secured to at least minimum University standards as specified below.
2.2. Before an agreement is made with an external organisation that specifies use of
encryption, it must be ascertained whether it is feasible to implement the encryption
standards demanded.
2.3. Advice and assistance in the use of encryption is offered by the IT Services
department. IT Services will support use of a limited range of encryption solutions that:
Equal or exceed the minimum standards indicated below and,
Where possible, equal or exceed typical requirements currently being specified for
handling data from external organisations.
2.4. To ensure that locally stored data can be recovered in the event of a computer
problem, such as a hard disk failure, it is vital that recoverable backups are maintained.
Use of encryption does affect the need for backups; if anything it makes them more
important because it is likely to remove the chance of recovering any data from a failed
system.
9 December 2008 (C. Nelson) Revised following feedback from the Steering Group.
23 January 2009 (C. Nelson) Revised based on input from the Steering Group.
29 January 2010 (C. Nelson) Removed reference to Outlook email signing and
encryption support by IT Services.
18 May 2011 (C. Nelson) Revisions resulting from review within IT Services.
The official version of this document will be maintained on-line. Before referring to any
printed copies please ensure that they are up-to-date.