How to enable and fix workflow checks on encryption key management
About
Encrypting stored data provides an additional layer of security, ensuring that information remains protected. Once encrypted, data can only be decrypted using a valid encryption key. Organizations commonly use industry-standard encryption algorithms to generate these keys.
Sprinto introduces workflow checks to help organizations meet compliance requirements for encryption key management:
Encryption/decryption keys should be generated securely
Organizations must maintain a document outlining the usage guidelines for encryption algorithms.
Encryption/decryption keys should be stored securely
Use a standard vault or storage service to store encryption keys securely.
Encryption/decryption keys should be retired securely
Retire any encryption keys that expire or are compromised to ensure secure data management.
Enabling workflow check
Follow the below procedure to enable workflow check:
Log in to Sprinto as administrator.
Go to Workflow checks, and click Add workflow check.
Click Enable next to the workflow you want to enable.
If required, click on Edit to modify the following details, then click Enable check.
Check details: Modify the Title, Description, and Instructions defined for the workflow check.
Trigger details: Modify the next date for activation and regular activation frequency.
Check responsibilities: Assign the workflow check owner and assign an evidence reviewer if required.
Fixing workflow check
Follow the procedure below to fix the check once the enabled workflow checks are activated (Due/ Critical/ Failing).
Log in to Sprinto as administrator.
Go to Security Hub > Workflow check, then select Active tab.
Choose the workflow check, and click Upload evidence.
Select the evidence record date and choose one of the following options to add evidence.
File: Upload the file from your computer.
Link: Provide a link for the cloud-stored evidence file.
Following are the evidence types to upload based on the activated workflow check.
Encryption/decryption keys should be generated securely
Upload an encryption document defining guidelines for using the encryption algorithm. Periodically review to ensure alignment with guidelines.
Encryption/decryption keys should be stored securely
Upload a screen capture showing the tools or vault service used to store the data encryption key.
Encryption/decryption keys should be retired securely
Upload a screenshot showcasing the retired encryption keys.
5. Click Finish; if an evidence reviewer is configured, they will review the uploaded evidence against the check.

Last updated