PR.DS-02.228

Does your organization implement cryptographic controls to protect the confidentiality and integrity of network communications?

Explanation

Cryptographic controls such as encryption, digital signatures, and cryptographic hashes are essential for protecting sensitive data during transmission across networks. Encryption ensures that data cannot be read if intercepted, digital signatures verify the authenticity of the sender, and cryptographic hashes confirm that data hasn't been altered during transmission. These controls are particularly important for communications containing sensitive information, remote access connections, and public-facing web applications. Evidence could include a cryptographic controls policy document, network architecture diagrams showing where encryption is implemented, configuration screenshots of TLS/SSL settings on web servers, VPN configuration details, or results from network scanning tools that verify the use of secure protocols and cipher suites.

Implementation Example

Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications

ID: PR.DS-02.228

Context

Function
PR: PROTECT
Category
PR.DS: Data Security
Sub-Category
The confidentiality, integrity, and availability of data-in-transit are protected

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron