Is the transport of sensitive data encrypted using security protocols/algorithms (e.g., system-to-client)?
Explanation
Example Responses
Example Response 1
Yes, all sensitive data transported between our systems and clients is encrypted using industry-standard protocols We enforce TLS 1.2 or higher for all web traffic using HTTPS, with modern cipher suites that meet NIST guidelines Our API endpoints only accept encrypted connections, and we regularly scan and test our TLS configurations using tools like SSL Labs For file transfers, we use SFTP with key-based authentication Our security policy mandates encryption for all sensitive data in transit, and we validate compliance through regular security assessments and continuous monitoring.
Example Response 2
Yes, we encrypt all sensitive data during transport using multiple security protocols For web-based access, we implement HTTPS with TLS 1.3 across all our applications and services Our mobile applications use certificate pinning to prevent man-in-the-middle attacks For internal system-to-system communications, we use mutual TLS authentication to ensure both endpoints are verified Database connections utilize TLS encryption with strong cipher suites We maintain a formal encryption standard that defines minimum requirements, and we conduct quarterly reviews of our encryption implementations to ensure they remain current with industry best practices.
Example Response 3
No, we currently do not encrypt all sensitive data during transport While our primary web application uses HTTPS for customer-facing interfaces, some of our internal system-to-system communications still use unencrypted protocols for legacy reasons We recognize this as a security gap and have developed a remediation plan to implement TLS 1.2+ encryption across all communication channels by the end of Q3 this year In the interim, we've implemented compensating controls including network segmentation and strict access controls to minimize risk Our security roadmap prioritizes completing this encryption initiative as a critical objective.
Context
- Tab
- Product
- Category
- Data

