Encryption and Cryptographic Controls Policy
Encryption and Cryptographic Controls Policy
Version 13.0
This document has been prepared using the following ISO27001:2013 standard
controls as reference:
ISO Control Description
A.15.1.2 Addressing security within supplier agreements
A.8.2.1 Classification of information
A.8.2.2 Labelling of information
A.13.1.1 Network controls
A.8.3.1 Management of removable media
A.8.3.2 Disposal of media
A.8.2.3 Handling of assets
A.13.2.1 Information transfer policies and procedures
A.13.2.2 Agreements on information transfer
A.8.3.3 Physical media transfer
A.13.2.3 Electronic messaging
A.6.2.1 Mobile device policy
1 Introduction
The protection of electronic information and systems continues to be a prime focus
for the Council. Protecting personally identifiable, business critical information and
the integrity of the Council’s computer network is of paramount importance.
A secure, robust ICT infrastructure, along with appropriate policies and procedures
will help to ensure that all necessary steps have been taken to protect the
confidentiality, integrity and availability of information, systems and data.
The General Data Protection Regulations (GDPR) and The Data Protection Act 2018
requires the Council to implement appropriate technical and organisational measures
to ensure that personal data is processed securely. Article 32 of the GDPR includes
encryption as an example of an appropriate technical measure. Encryption is a
widely available measure with relatively low costs of implementation and helps to
ensure that appropriate controls are used.
2 Purpose
The purpose of this policy is to establish the methods by which the Council takes in
the application of encryption and cryptographic control technologies - ensuring that
data is protected however and wherever it is processed, stored or communicated and
that the Council’s ICT computer network and devices are appropriately secured from
unauthorised access and compromise.
3 Scope
This policy applies to the use and configuration of encryption applied to Council ICT
systems, computing devices, communication technologies and services - including all
employees, elected members, contractors, volunteers, vendors, apprenticeships,
student/work experience placements and partner agencies who have access to these
systems, equipment and devices.
4 Policy Statement
Mobile Devices
• All Council provided mobile phones must be configured to force the use of a
pin code lock which includes a minimum of eight characters. While the use of
a PIN alone to secure a mobile phone does not constitute encryption, it does
play a vital role in supporting mobile device encryption.
• Council managed mobile Apps which are authorised for use and which may
process or handle personally identifiable data must use encryption to protect
data.
• Council authorised Apps must use secure encrypted communication protocols
such as HTTPS/TLS1.2 (or higher) when communicating over the internet or
any other unspecified network connection.
Where required, the Council provides encrypted USB data sticks. These storage
devices are for the temporary storage of data only.
The Council allows the use of council issued USB data sticks (and similar storage
devices) under the following conditions:
Other portable USB devices include mobile phones, cameras etc. These other
devices should not be used to store Council data on the device. Data collected as
part of their use should be transferred to the appropriate system at the earliest
opportunity.
Personal storage media and equipment must NOT be connected to the Council’s
network and must NOT be used to store Council data.
The ICT Service Desk will advise on the best method to encrypt individual files.
Internet
Cryptographic keys are required to access data and systems which utilise encryption.
The Council takes the following approach in the management of these keys:
N.B.
The loss of a decryption key could cause data to become inaccessible.
Depending on the circumstances, loss of a decryption key could constitute
‘accidental loss, destruction or damage’ to personal data and would therefore
be a contravention of the GDPR’s security principle. Additionally, if data
cannot be restored, this may also constitute a personal data breach due to a
lack of availability.
5 Responsibilities
The Council has a responsibility to provide its employees with the appropriate
secure storage mechanisms, procedures, devices and software for the secure
handling, storage and retrieval of all electronic data held by the Council. The use
of portable devices may be subject to random periodic review by the Council to
ensure compliance with the encryption policy.
6 Breaches of Policy
Breaches of this policy and/or security incidents can be defined as events which
could have, or have resulted in, loss or damage to Council assets, or an event which
is in breach of the Council’s security procedures and policies.
All Council employees, elected members, volunteers, partner agencies, contractors
and vendors have a responsibility to report security incidents and breaches of this
policy as quickly as possible through the Council’s Incident Reporting Procedure.
This obligation also extends to any external organisation contracted to support or
access the Information Systems of the Council.