Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Anchor_gjdgxs_gjdgxsVanta policy template instructions

This Vanta policy template represents a complete, compliance-ready policy with placeholders for company specific text. Each policy section represents a policy-specific topic that you should consider and/or modify to match your company’s practices.

For each policy section

  • Consider if this section and its corresponding risks applies to you. If it does not, remove it and/or replace it with your organization’s corresponding practices.

  • Replace any highlighted text in angled brackets < >1 with your own language

  • Rewrite the policy language such that it reflects the practices of your organization

Policy completion checklist

  1. Use Find to make sure that all text in angled brackets is replaced

  2. Proofread your policy for spelling and grammar mistakes

  3. Confirm that the policy’s content reflects your organizations practices

  4. Add any company-specific letterhead, branding, and formatting

  5. Remove this instructions page

  6. Export this document as PDF — File > Save As > Change “File Format” to PDF

  7. Upload the PDF to Vanta at https://app.vanta.com/policies

More questions?

A good rule-of-thumb is to keep your language high enough level such that it stays representative for at least a year. If you have more questions about how to use this template, please reach out to support@vanta.com or your auditor for additional guidance.

Cryptography Policy

Policy Owner: <Policy owner>

Effective Date: <Effective date>

Policy Owner: Principal Engineer

Effective Date: 2023-05-01

Anchor
purpose
purpose
Purpose

To ensure proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information. This policy establishes requirements for the use and protection of cryptographic keys and cryptographic methods throughout the entire encryption lifecycle.

Anchor

...

scope

...

scope
Scope

All information systems developed and/or controlled by <Company Name> CloudCard which store or transmit confidential data.

Anchor

...

policy

...

policy
Policy

<Company Name> CloudCard shall evaluate the risks inherent in processing and storing data, and shall implement cryptographic controls to mitigate those risks where deemed appropriate. Where encryption is in use, strong cryptography with associated key management processes and procedures shall be implemented and documented. All encryption shall be performed in accordance with industry standards, including NIST SP 800-57.

Customer or confidential company data must utilize strong ciphers and configurations in accordance with vendor recommendations and industry best practices including NIST when stored or transferred over a public network.

...

Anchor

...

key-management
key-management
Key Management

Access to keys and secrets shall be tightly controlled in accordance with the Access Control Policy2.

The following table includes the recommended usage for cryptographic keys3:

Domain

Key Type

Algorithm

Key Length

Max Expiration

Web Certificate

RSA or ECC with SHA2+ signature

RSA or ECC with SHA2+ signature

2048 bit or greater/RSA, 256bit or greater/ECC

Up to 1 year

Web Cipher (TLS)

Asymmetric Encryption

Ciphers of B or greater grade on SSL Labs Rating

Varies

N/A

Confidential Data at Rest

Symmetric Encryption

AES

256 bit

1 Year

Passwords

One-way Hash

Bcrypt, PBKDF2, or scrypt, Argon2

256 bit+10K Stretch. Include unique cryptographic salt

+pepper

N/A

Endpoint Storage (SSD/HDD)

Symmetric Encryption

AES

128 or 256 bit

N/A

Anchor

...

exceptions

...

exceptions
Exceptions

Requests for an exception to this policy must be submitted to the <approver of requests for an exception to this policy, e.g., IT Manager> for Principal Engineer for approval.

A documented exception is required prior to moving, copying, or storing customer or company confidential data on any media or removable device; all portable devices and removable media containing sensitive data must be encrypted using approved standards and mechanisms4.

...

Anchor

...

violations-and-enforcement
violations-and-enforcement
Violations & Enforcement

Anchor_30j0zll_30j0zllAny known violations of this policy should be reported to the <recipient of reports of violations of this policy, e.g., IT Manager>Principal Engineer. Violations of this policy can result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.

...

Version

Date

Description

Author

Approved by

<1

1.

0>

0

<29

2023-

Apr

03-

2020>

21

<First Version>

<OWNER>

<APPROVER>

1 All fields in this document marked by angled brackets < > and highlighted must be filled in.

2 This is a reference to another Vanta policy. If you are not planning on using this policy, either describe your company’s access control policies and procedures here or replace this with a phrase like, “based on need to know” or “in accordance with the principle of least privilege.”

3 Customize this table to describe your company’s cryptography practices and minimum requirements

...

First Version

Ryan Heathcote

Luke Rettstatt