Proxymity

Encryption and Key Management

  • Implement robust encryption key management procedures, incorporating regular rotation of encryption keys
  • Encrypt all data in transit and at rest using encryption standards and algorithms (AES 256 and >=tls1.2)
  • Ensure key management system (KMS) utilised to support Proxymity’s use of cryptographic techniques

Stay in touch

Stay updated with the latest trends. Sign up for our newsletter.