
result in significant consequences to the organization, including reputation
damage, harmful effects to customers and stakeholders (such as identity theft),
and legal and financial penalties.
Ty p i c a l l y, b r e a c h e s o f t h e c o n f i d e n t i a l i t y a n d p r i v a c y r e q u i r e m e n t s d o n o t
directly result in disruption of associated services. Instead, because of the nature
of the consequences of the breach, the disruption typically occurs at the enter-
prise or organizational level, and this in turn has a negative impact on one or
more operational services. Thus, while the damage is referential, there is still an
impact on operations that must be managed.
The development, implementation, and management of appropriate controls
can limit potential breaches of confidentiality and privacy and minimize impact
on operational services. These controls include encryption of data and informa-
tion, controlling access to these assets, and controlling how these assets are
disposed of after their useful life.
General controls relative to preserving the confidentiality and privacy of
information assets may be included as part of practice KIM:SG2.SP2. However,
the specific practices contained in KIM:SG4.SP1 through KIM:SG4.SP3 are tar-
geted baseline controls that must be implemented to manage the confidentiality
and privacy aspects of information assets that affect operational resilience.
KIM:SG4.SP1 ENCRYPT HIGH-VALUE INFORMATION
Cryptographic controls are applied to information assets to ensure confidentiality and
prevent accidental disclosure.
Encryption provides an additional layer of control over information assets by
ensuring that they are accessible only by those who have the appropriate “keys”
to decipher them. In addition to access controls, encryption provides another
layer of protection because the information that is accessible is useless to anyone
who does not hold the privilege of having the keys necessary to read it.
Encryption is an especially important control for information assets that are
frequently transmitted electronically via networks, for media that are mobile
(such as disks), and for public or private communications segments.
Encryption is typically applied to electronic forms of information assets, such
as files, databases, and other media. However, paper-based information may also
be encrypted (using codes) so that it is rendered meaningless to those who do
not have the means to manually decipher it.
Ty p i c a l w o r k p r o d u c t s
1. Policy and guidelines for encryption application
2. Encryption methodologies and technologies
524 PART THREE CERT-RMM PROCESS AREAS