What cryptographic standards do you use to protect data at rest? (e.g., AES-256)
Explanation & Context
Explanation of the Question:
This question is asking about the specific cryptographic standards your organization uses to secure data that is stored, or "at rest." Cryptographic standards are established methods for encrypting data to make it unreadable to unauthorized users. When data is at rest, it is stored on physical media such as hard drives, SSDs, or backup tapes. Protecting this data is crucial because if an attacker gains access to the storage media, they would need to decrypt the data to read it. Using strong cryptographic standards ensures that even if the data is accessed, it remains secure and unreadable without the proper decryption keys.
Why It Matters and Example Evidence:
Understanding and disclosing the cryptographic standards you use is important because it demonstrates your commitment to data security. It also helps stakeholders assess whether your encryption methods meet industry standards and regulatory requirements. For example, using AES-256 (Advanced Encryption Standard with a 256-bit key) is a strong choice because it is widely recognized for its security and is used by governments and organizations worldwide.
To provide evidence of your cryptographic standards, you might reference your data protection policies, configuration settings from your encryption tools, or audit reports that detail the encryption methods in use. For instance, you could show a configuration file from your encryption software that specifies AES-256 as the encryption algorithm for data at rest, or an excerpt from an audit report confirming the use of this standard.
Example Responses
Example Response 1
We utilize AES-256 encryption for all data at rest within our Heroku-hosted environment. This standard is applied across all databases and storage solutions to ensure the highest level of security for our customer data.
Example Response 2
Our AWS-hosted infrastructure employs a combination of AES-256 and RSA-4096 encryption standards for data at rest. These cryptographic methods are implemented across our S3 buckets, EBS volumes, and RDS instances to safeguard sensitive information.
Example Response 3
As our software is exclusively deployed on-premises and does not involve cloud storage, the question regarding cryptographic standards for data at rest is not directly applicable. However, we ensure that all data stored on our local servers is protected using FIPS 140-2 validated encryption algorithms.

