LEP Data Encryption Policy
LEP Data Encryption Policy
[LEP] “Confidential Information” and Employee, Educator or Student Personally Identifiable Information
(“PII”) must be protected while stored at-rest and in-transit. Appropriate encryption technologies must be
used to protect the [LEP].
2. Purpose
The purpose of this policy is to provide guidance on the use of encryption technologies to protect [LEP]
data, information resources, and other Confidential Information or PII while stored at rest or transmitted
between parties. This policy also provides direction to ensure that regulations are followed.
3. Scope
This policy applies to all [LEP] staff that create, deploy, transmit, or support application and system
software containing Confidential Information or PII. It addresses encryption policy and controls for
Confidential Information or PII that is at rest (including portable devices and removable media), data in
motion (transmission security), and encryption key standards and management.
4. Policy
5. ACCESS
The use of proprietary encryption algorithms are not allowed unless reviewed by qualified
experts outside of the vendor in question and approved by [LEP] management.
7. AT-REST ENCRYPTION
Hard drives that are not fully encrypted (e.g., disks that one or more un-encrypted
partitions, virtual disks) but connect to encrypted USB devices, may be vulnerable to
security breach from the encrypted region to the unencrypted region. Full disk
encryption avoids this problem and shall be the method of choice for user devices
containing Confidential Information or PII.
o Use of Virtual Private Networks (VPN’s) and Firewalls with strict access
controls that authenticate the identity of those individuals accessing the
Confidential Information or PII
o File systems, disks, and tape drives in servers and Storage Area Network
(SAN) environments are encrypted using industry standard encryption
technology
o Computer hard drives and other storage media that have been encrypted
shall be sanitized to prevent unauthorized exposure upon return for
redistribution or disposal
Portable devices (e.g. smart-phones, flash cards, SD cards, USB file storage)
represent a specific category of devices that contain data-at-rest. Many incidents
involving unauthorized exposure of Confidential Information or PII are the result of
stolen or lost portable computing devices. The most reliable way to prevent
exposure is to avoid storing Confidential Information or PII on these devices.
o Devices shall not be used for the long-term storage of any Confidential
Information or PII.
o Removable media including CD’s, DVD’s, USB flash drives, etc. shall not be
used to store Confidential Information or PII.
9. IN-TRANSIT ENCRYPTION
In-transit encryption refers to transmission of data between end-points. The intent of these
policies is to ensure that Confidential Information or PII transmitted between companies,
across physical networks, or wirelessly is secured and encrypted in a fashion that protects
student Confidential Information or PII from a breach.
Users follow [LEP] acceptable use policies when transmitting data and take particular
care when transmitting or re-transmitting Confidential Information or PII received from
non-[LEP] staff.
Strong cryptography and security protocols (e.g. TLS, IPSEC, SSH, etc.) are used to
safeguard Confidential Information or PII during transmission over open public
networks. Such controls include:
o Only accepting trusted keys and certificates, protocols in use only support
secure versions or configurations, and encryption strength is appropriate for
the encryption methodology in use.
o Public networks include but are not limited to the Internet, Wireless
technologies, including 802.11, Bluetooth, and cellular technologies.
Effective enterprise public and private key management is a crucial element in ensuring
encryption system security. Key management procedures must ensure that authorized
users can access and decrypt all encrypted Confidential Information or PII using controls
that meet operational needs. [LEP] key management systems are characterized by
following security precautions and attributes:
[LEP] uses procedural controls to enforce the concepts of least privilege and
separation of duties for staff. These controls apply to persons involved in encryption
key management or who have access to security-relevant encryption key facilities
and processes, including Certificate Authority (CA) and Registration Authority (RA),
and/or contractor staff.
[Insert Appropriate Role] shall verify backup storage for key passwords, files, and
Confidential Information or PII to avoid single point of failure and ensure access to
encrypted Confidential Information or PII.
Key management should be fully automated. [LEP] [Insert Appropriate Role] should
not have the opportunity to expose a key or influence the key creation.
Application and system resource owners should be responsible for establishing data
encryption policies that grant exceptions based on demonstration of a business need
and an assessment of the risk of unauthorized access to or loss of Confidential
Information or PII.
Key management processes and procedures for cryptographic keys are fully
documented.
Note: If retired or replaced cryptographic keys need to be retained, these keys must be
securely archived. Archived cryptographic keys should only be used for
decryption/verification purposes.
Cryptographic key custodians shall formally acknowledge that they understand and
accept their key-custodian responsibilities.
[LEP] shall inventory encrypted devices and validate implementation of encryption products
at least annually.
Exception logs exist and can be produced for those resources that are excluded from this
policy.
12. Enforcement
Staff members found in policy violation may be subject to disciplinary action, up to and including
termination.
13. Distribution
This policy is to be distributed to all [LEP] staff and contractors using [LEP] Confidential Information or PII
resources.