IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition
by Alan Calder, Steve Watkins
CHAPTER 17: CRYPTOGRAPHY
ISO 27002 says, at 8.24, that the organization should develop and follow a policy on the use of cryptographic controls for the protection of information.
Any decision as to whether a cryptographic solution is appropriate should be part of the wider process of assessing risks and selecting controls. A risk assessment should determine the necessary level of protection to be given to information, and a cost–benefit exercise should be carried out. This risk assessment should also address issues such as unauthorized circulation of encryption keys; it might be appropriate for the organization to retain copies of all employee encryption keys against the danger of their being lost or of a disgruntled employee first encrypting ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access