Cryptography Policy
Cryptography Policy
Cryptography Policy
Corporate policy
Cryptography Policy
Purpose of this policy
This policy describes the approach of the Department of Planning and Environment (the department) to securing
sensitive information via approved algorithms and protocols for implementation based upon an identified need. It
aims to provide a secure and consistent approach and is aligned to the Australian Cyber Security Centre
Information Security Manual.
Cryptography provides the department with confidentiality, integrity, secure authentication and non-repudiation
of information. Encryption of data at rest can reduce physical storage and handling requirements, whilst
encryption in transit protects sensitive information being communicated over public networks.
Policy statement
Risk-based approach
Cryptographic controls are implemented following a risk-based approach that considers the sensitivity of the
information the cryptographic controls are planned to protect. The implementation of cryptographic controls
does not alter the sensitivity of the encrypted information. Cryptography limits the ability of the information to
be accessed by an attacker in the event that it is exposed.
Cryptographic key management practices are implemented following a risk-based approach that considers the
sensitivity and criticality of the information; the cryptographic key protects.
Consideration must also be given to whether the key is for data in transit or at rest and the duration of the
cryptographic key life.
© State of New South Wales through Department of Planning and Environment 2022. Information contained in this publication is based on knowledge and
understanding at the time of writing and is subject to change. For more information, please visit dpie.nsw.gov.au/copyright POL21/16
Cryptography Policy
• Standard application code must never read or use cryptographic keys directly, key management libraries
should be implemented.
Key security
• Key strength must be as per the current version of the Australian Cyber Security Centre (ACSC) Information
Security Manual (ISM).
• Keys must be used for a single purpose only so as not to weaken the security provided.
• Keys must be generated by a cryptographic module (hardware preferred) with any random value required
generated with the same module.
• The distribution of keys must be via a secure channel only.
Key backup
If an encryption key is lost, data encrypted with it must never be recovered, therefore keys must be securely
backed up as follows:
Cryptographic protocols
For a list of approved cryptographic protocols please refer to the current version of the ACSC ISM.
Cryptographic algorithms
For a list of approved cryptographic algorithms please refer to the current version of the ACSC ISM.
Exemptions
• Exemptions to this policy must comply with the ISMS Exemption Request Management Standard.
• Exemptions must only be approved where it is technically, practically or financially infeasible to comply
with this policy.
• Reviews of exemptions must be performed annually.
Individuals who are not government sector employees such as volunteers, contingent or labour hire workers,
professional services contractors and consultants may have their services, contract or agreement terminated
immediately, or legal action could be taken if they are found to have violated this policy.
Review timeframe
Digital Information Office will review this policy no later than 3 years from the date the document is approved.
This policy may be reviewed earlier in response to post-implementation feedback, changes to legislation, or as
necessary in accordance with the department’s policy and procedures.
Related documents
This policy should be read in conjunction with the following documents:
Policy metadata
Table 1. Policy metadata
Category Description
Status Final
Associated procedure
Version control
Table 2. Version Control
Appendices
Appendix 1 – Definitions
Appendix 1 – Definitions
Table 3 - Definitions
Term Definition
Encryption The process of encoding data / information in such a way that only authorised
parties can access.
Escrow An arrangement in which the keys needed to decrypt encrypted data are held
in escrow so that in certain circumstances an authorised party can gain access
to the keys for utilisation.
Chief Information Security • Must develop, maintain and improve this policy.
Officer (or equivalent) • Must monitor and report on compliance to this policy (effectiveness
measurements).
• Must review exemptions to this policy.