Asset & Data Management · AD-Q06

Question: Are encryption controls implemented for data at rest and in transit, aligned to classification and regulatory requirements?

Objective — Why This Matters

Encryption is a last line of defense. Aligning it to data sensitivity and law prevents costly disclosures and reduces breach impact.

Maturity Levels (0–5)

0 — Unaware
No consistent encryption; outdated protocols.
1 — Ad Hoc
Some TLS; storage encryption varies by system.
2 — Defined
Policy defines cipher standards and key management basics.
3 — Managed
Encryption enforced on critical systems and external channels.
4 — Integrated
Key management centralized; rotation and access logged.
5 — Optimized
Automated certificate and key lifecycle; regular crypto reviews.

How to Level Up

From → To Actions
0 → 1 Mandate TLS 1.2+ and enable storage encryption on new systems.
1 → 2 Approve crypto policy (ciphers, key lengths, rotation); define KM roles.
2 → 3 Enforce TLS everywhere; enable disk/db encryption for Restricted data.
3 → 4 Centralize keys/certs; implement rotation and access audits.
4 → 5 Automate issuance/renewal; run annual cryptography review.

People / Process / Technology Enablers

Evidence Required

Metrics / KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Certs Let’s Encrypt (ACME) Automate renewals; monitor expiry.
Scanning sslyze / testssl.sh Verify protocol/cipher posture.
KMS Cloud-native KMS Start with managed KMS; document roles.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001 A.8.24–A.8.28 (cryptography).
NIST CSF 2.0 PR.DS-1/2/6.
DPDP Act 2023 Safeguards for personal data in transit/storage.
NIRMATA Scoring AD-Q06 Level ≥3 requires enforced encryption + KM evidence.