Skip to content

Commit 3a3ded5

Browse files
author
Andrew Luke
committed
Added table of contents
1 parent 9a70e49 commit 3a3ded5

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

Coding Practice/Cryptographic-Guidelines.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,13 @@
66

77
This document provides guidelines for how utilize encryption to protect data in transit and at rest. Cryptographic requirements at [COMPANY_NAME] are heavily influenced by NIST's Cryptographic Standards and Guidelines (CSRC) documentation.
88

9+
- [Store the Cryptographic Hash of a Password](#store-the-cryptographic-hash-of-a-password)
10+
- [Encrypt Sensitive Data At Rest](#encrypt-sensitive-data-at-rest)
11+
- [Encrypt Data In Transit](#encrypt-data-in-transit)
12+
- [Facilitate and Exercise Key Rotation](#facilitate-and-exercise-key-rotation)
13+
- [Use Secure Random Number Generators](#use-secure-random-number-generators)
14+
- [Store Private and Symmetric Keys in a Secure Location](#store-private-and-symmetric-keys-in-a-secure-location)
15+
916
## Recommendations
1017

1118
### Store the Cryptographic Hash of a Password
@@ -119,9 +126,7 @@ In order to support periodic and on-demand (e.g., security incident) key rotatio
119126

120127
When rotating keys it is often necessary for previous keys to stay around for a time to decrypt past data. A previous key should never be used to encrypt data once it is no longer the primary key. It should only be used to decrypt the data it was used to encrypt. When the data is ready to be stored again it should then be encrypted with the current key and stored.
121128

122-
### Secure Random Number Generation
123-
124-
129+
### Use Secure Random Number Generators
125130

126131
#### Recommended Cryptographically Secure Pseudo-Random Number Generators (CSPRNG)
127132

0 commit comments

Comments
 (0)