Search


Protection of Data-in-Transit

(Back)

Objective

Protect data transiting networks through the use of appropriate encryption and network safeguards.

Key Considerations

Validation

Applicable Service Models

References

  1. SPIN 2017-01, subsection 6.2.4
  2. ITPIN 2018-01
  3. Refer to the cryptography guidance in 40.111 and 40.062.
  4. Refer to the network security zoning guidance in ITSG-22 and ITSG-38.
  5. Refer to the guidance in Considerations for Cryptography in Commercial Cloud Services.
  6. Related security controls: SC‑8, SC‑8(1), SC‑12, SC‑13, SC‑17