A.8.24 Use of cryptography
Cryptography is a critical enabler of secure digital business. It supports secure communications, protects data at rest and in transit, and helps organisations comply with legal, regulatory, and contractual requirements. To meet control A.8.24 of ISO 27001 requires organisations to implement cryptographic controls appropriately—while also recognising that cryptography is complex, and misconfigurations or poor key management can create vulnerabilities.
This implementation of this can be separated into two activities.
Policy
Firstly, you need to develop and implement a policy on the use of cryptographic controls.
This is often implemented by having a policy that outlines how you will use cryptographic controls. Industry recognised algorithms and protocols which have been proven to be resilient to attack and strong enough to protect your assets should be used.
The policy should also outline when you will use cryptography, linking back to your data classifications and considering any regulatory or other requirements. You should consider and detail requirements for the two key states of your data: in transit and at rest.
Cryptographic Lifecycle
Secondly, you need to develop and implement a policy on the use, protection and lifetime of cryptographic elements throughout their whole lifecycle.
This can be implemented by creating a policy on how you will use keys for managing encryption and decryption. To start with, this should consider using a centralised key management system to store and manage keys and securing access to keys to only those who require it by role-based access.
The rotation and revocation processes to manage key lifecycle should be automated where possible, with access logging and MFA enforced where human access is required. Ensure that key storage mechanisms in any cloud storage are well understood and best practices as recommended by the provider are utilised.
Of course, ensure that systems using encryption are maintained through patching, and your encryption processes are tested. Cryptographic systems utilised should be included in logging and alerting, with access attempts, any key creation and usage, certificate expirations monitored.
Summary
Managing the use of encryption to meet this control isn't about applying encryption everywhere, it's about applying it wisely. A clear policy, strong key management, adherence to best practices, and periodic reviews will ensure cryptography becomes a strength rather than a liability in your information security management system.