Solutions
The best route to security compliance
Resources
Everything you need to know
Company
Security and customers first
Close

Request a demo

Find out today the difference that Hicomply’s unique solution can make to your business.

Close

Thank you for your request

Success

In the meantime, connect with Hicomply for insights on authentication and fraud prevention

Close

ROI Calculator

See how much you could save with Hicomply

Hicomply feature Yearly saving
Automated scoping Easily scope your ISMS with the Hicomply platform
Asset register autogeneration A shorter learning curve for organisations and a simplified process
Risk assessment Autogenerate your risk register and risk treatment plan
Extended policy templates 90% of the essential are already written out of the box
Controls framework All controls are pre-loaded and already linked to the risks they mitigate
Task management Automate all actions, administration and setup time of your ISMS
Real time monitoring Understand status and progress across your ISMS with the Hicomply dashboard
Compliance & Training Your whole team, on the same page
Audit readiness Hicomply makes sure you have everything in place for your audit
Auditor access Give auditors a dedicated login to access and audit your ISM
Back to Resource Hub

ISO 27001 Annex A.10: Cryptography

A.10.1 Cryptographic controls

These controls aim to ensure the efficient use of cryptography to promote data confidentiality and integrity.

A.10.1.1: Policy on the use of cryptographic controls

Cryptography, including encryption, can be used for both storage (data at rest) and transmission (data in transit). It also helps secure information stored or transferred through i.e. databases, unstructured folders, employee hard drives and digital devices like flash drives and mobile phones.

Think of how cryptography can benefit your business model as like many other things, this will depend on the size and functions of your company and what best solution works for your products and risk tolerance. When constructing an encryption policy, it is important to list and assess all possible risks associated such as the possibility of corrupted or missing keys. And then focus on applying controls to mitigate those threats and achieve your goals.

A.10.1.2: Key Management

A sound cryptographic policy will consider safe practices for maintaining encryption keys throughout their entire life cycle, the cycle is from creating the key through its distribution, storage, backup and destruction. Implementing strong keys is one thing but maintaining them is another. Attackers identify flaws in keys and then use these flaws to gain access.

Your policy needs to account for protocols and procedures regarding:

  • key generation
  • encryption algorithms,
  • cryptographic applications,
  • public-key certificates and authentications
  • key activation and disabling.
  • user access approvals,
  • key adjustments and upgrades,
  • missing, damaged or corrupted keys,
  • recovery processes,
  • archives and
  • key logs for auditing and management purposes.

More Resource Hub

ISO27001
Testing forms
ISO27001
SOC 2 Type 1 vs SOC 2 Type 2
ISO27001
SOC 2 Compliance Checklist (2022)

Get ISO 27001 certified

Secure your data, win more business.