ESP PROGRAM DEFINITION

advertisement
Department of Information Technology
Office of Information Security
Title
Data Encryption Guidelines
Purpose
Encryption when combined with appropriate access controls is an important technology for protecting the
confidentiality and integrity of College data. The following guidelines help illustrate when encryption is necessary to
protect College data.
Scope
These guidelines apply to all devices storing or transmitting College data.
Requirements:
1.
Transmission :
a. Confidential data must be transmitted using encryption.
b. Passwords for College accounts should always be transmitted using encryption.
c. It is recommended but not required that encryption be used when transmitting any data not intended
for public use.
2.
Storage:
a. Confidential data must be encrypted if stored on a portable device.
Implementation Guidance
Transmisson
1.
File transfers
Encrypted file transfers can be done by using an encrypted transmission protocol or service such as sftp or scp.
If an unencrypted mechanism is used to transfer a confidential file, the file must encrypted before being
transferred. Information Technology provides sftp and scp access to the personal file space for all faculty,
staff, and students. Sftp access is available for shared storage space.
2.
Web Applications
Confidential data communicated between a web application and the client machine should be encrypted using
TLS/SSL or other secure protocols.
3.
Remote Sessions
Remote sessions to machines storing confidential data must be encrypted through the use of secure protocols
or applications (TLS/SSL, SSH). Remote sessions that are authenticated using College credentials must be
encrypted.
4.
Email
Email is not considered a secure method for sharing sensitive files. The College has clear rules prohibiting
this. End users are instructed to contact Information Technology if assistance is needed with transferring
secure files.
Page 1 of 2
Department of Information Technology
Office of Information Security
5.
Virtual Private Network
The College provides an VPN that can provide encrypted access to services that don’t offer encryption
services natively. VPN access is available upon request.
Storage
1.
Whole Disk Encryption
Encryption of confidential data stored on portable devices(laptops, PDAs, phones) should be done using
whole disk encryption when technically feasible. In the absence of whole disk encryption, file based
encryption should be used..
2.
File encryption
File level encryption of confidential data is appropriate when files must be sent using an unencrypted transport
method or when storing confidential data on portable media(USB drives, CDs, tapes).
Definitions
Review and Revision History
Author
Pete Kellogg, ISO
Pete Kellogg, ISO
Notes
Initial version.
No changes.
Date
6-1-2008
5-27-2010
Page 2 of 2
Download