Cryptography

MedStack Confidential

Metadata

Use the best reasonably available cipher strength and key length

Use current standard open-source and vendor cryptographic methods and implementations

CodeSectionTitle
OWASP Cryptographic Storage Cheat Sheet Algorithms
OWASP Cryptographic Storage Cheat Sheet Custom Algorithms

Encrypt all data at rest

Encrypt all data in transit

CodeSectionTitle
PCI-DSS Requirement 4 Encrypt transmission of cardholder data across open, public networks
HIPAA 164.312(e)(1) Standard: Transmission security
HIPAA 164.312(e)(2)(i) Integrity controls (Addressable)
HIPAA 164.312(e)(2)(ii) Encryption (Addressable)

Manage cryptographic keys

CodeSectionTitle
ISO A.10.1.2 Key management
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Use certificates to authenticate keys

Legal compliance

CodeSectionTitle
ISO A.18.1.5 Regulation of cryptographic controls

Enforcement

References

CodeSectionTitle
ISO A.10.1 Cryptographic controls
ISO A.10.1.1 Policy on the use of cryptographic controls
HIPAA 164.312(a)(2)(iv) Encryption and decryption (Addressable)
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.