{"id":31083,"date":"2017-04-10T10:08:54","date_gmt":"2017-04-10T14:08:54","guid":{"rendered":"http:\/\/www.opensource.im\/?p=31083"},"modified":"2017-04-10T10:08:54","modified_gmt":"2017-04-10T14:08:54","slug":"ffiec-it-examination-handbook-infobase-encryption","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/ffiec-it-examination-handbook-infobase-encryption.php","title":{"rendered":"FFIEC IT Examination Handbook InfoBase &#8211; Encryption"},"content":{"rendered":"<p><p>Action Summary        <\/p>\n<p>      Financial institutions should employ encryption to mitigate      the risk of disclosure or alteration of sensitive information      in storage and transit.Encryption implementations      should include    <\/p>\n<\/p>\n<p>    Encryption is used to secure communications and data storage,    particularly authentication credentials and the transmission of    sensitive information. It can be used throughout a    technological environment, including the operating systems,    middleware, applications, file systems, and communications    protocols.  <\/p>\n<p>    Encryption can be used as a preventive control, a detective    control, or both. As a prevention control, encryption    acts to protect data from disclosure to unauthorized    parties. As a detective control, encryption is used to    allow discovery of unauthorized changes to data and to assign    responsibility for data among authorized parties. When    prevention and detection are joined, encryption is a key    control in ensuring confidentiality, data integrity, and    accountability.  <\/p>\n<p>    Properly used, encryption can strengthen the security of an    institution's systems. Encryption also has the potential,    however, to weaken other security aspects. For instance,    encrypted data drastically lessens the effectiveness of any    security mechanism that relies on inspections of the data, such    as anti-virus scanning and intrusion detection systems.    When encrypted communications are used, networks may have to be    reconfigured to allow for adequate detection of malicious code    and system intrusions.  <\/p>\n<p>    Although necessary, encryption carries the risk of making data    unavailable should anything go wrong with data handling, key    management, or the actual encryption. For example, a loss    of encryption keys or other failures in the encryption process    can deny the institution access to the encrypted data.    The products used and administrative controls should contain    robust and effective controls to ensure reliability.  <\/p>\n<p>    Financial institutions should employ an encryption strength    sufficient to protect information from disclosure until such    time as the information's disclosure poses no material    threat. For instance, authenticators should be encrypted    at a strength sufficient to allow the institution time to    detect and react to an authenticator theft before the attacker    can decrypt the stolen authenticators.  <\/p>\n<p>    Decisions regarding what data to encrypt and at what points to    encrypt the data are typically based on the risk of disclosure    and the costs and risks of encryption. The costs include    potentially significant overhead costs on hosts and networks.    Generally speaking, authenticators are encrypted whether on    public networks or on the financial institution's    network. Sensitive information is also encrypted when    passing over a public network and also may be encrypted within    the institution.  <\/p>\n<p>    Encryption cannot guarantee data security. Even if    encryption is properly implemented, for example, a security    breach at one of the endpoints of the communication can be used    to steal the data or allow an intruder to masquerade as a    legitimate system user.  <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"http:\/\/ithandbook.ffiec.gov\/it-booklets\/information-security\/security-controls-implementation\/encryption.aspx\" title=\"FFIEC IT Examination Handbook InfoBase - Encryption\">FFIEC IT Examination Handbook InfoBase - Encryption<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Action Summary Financial institutions should employ encryption to mitigate the risk of disclosure or alteration of sensitive information in storage and transit.Encryption implementations should include Encryption is used to secure communications and data storage, particularly authentication credentials and the transmission of sensitive information. It can be used throughout a technological environment, including the operating systems, middleware, applications, file systems, and communications protocols. Encryption can be used as a preventive control, a detective control, or both. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-31083","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31083"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=31083"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/31083\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=31083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=31083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=31083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}