Can you accommodate encryption requirements using open standards?
Explanation
Example Responses
Example Response 1
Yes, our organization fully supports and implements encryption using open standards We use AES-256 for data at rest encryption, TLS 1.2/1.3 for all data in transit, and RSA-2048 or higher for asymmetric encryption needs Our key management practices follow NIST guidelines, and we support standard protocols like HTTPS, SFTP, and IPsec for secure communications We regularly review our encryption implementations to ensure they remain compliant with current standards and best practices.
Example Response 2
Yes, we implement encryption using open standards across our entire infrastructure and application stack For data at rest, we use FIPS 140-2 validated encryption modules implementing AES-256 All network communications are secured using TLS 1.2+ with strong cipher suites as recommended by NIST SP 800-52r2 We support standard encryption protocols like SSH, HTTPS, and S/MIME Our cryptographic implementations are regularly reviewed by third-party security firms to ensure proper implementation of these open standards.
Example Response 3
Partially While we do use some open standards like TLS 1.2 for web traffic and HTTPS for our customer-facing portal, our core application uses a proprietary encryption algorithm developed in-house for historical reasons This custom encryption method was developed before widespread adoption of current standards and is deeply integrated into our legacy systems We recognize this is not ideal from a security perspective, and we have a 12-month roadmap to migrate all proprietary encryption to AES-256 and other open standards, but we cannot currently accommodate all encryption requirements using open standards.
Context
- Tab
- Organization
- Category
- Policies, Processes, and Procedures

