Phases of building an encryption strategy
Building an enterprise-level encryption strategy requires a multi-phased approach. Each phase defines a set of controls to help you achieve your desired, tangible results. This document guides you through these phases and asks you specific questions to help you customize your encryption strategy.
Building an encryption strategy for data at rest consists of the following sequential phases:
-
Encryption policy – Build a policy that defines the data-at-rest encryption objectives for your enterprise.
-
Encryption standards – Define the technical and procedural standards that help you realize your enterprise policy.
-
Encryption framework – Build the framework that helps all stakeholders understand, change, and implement your encryption standards.
-
Implementation – Deploy your encryption infrastructure.