Encryption Standard 

 

Purpose 

To ensure that university data is appropriately encrypted to prevent access by unauthorized individuals. 

 

Scope 

This policy applies to all workstations and servers that store, process, or transmit university data. 

 

Standard 

Encryption types 

Data-at-rest encryption is a control designed to protect information stored on a system.  Data-in-transit encryption is a control designed to protect information traveling between two or more systems. 

University-provided workstations 

All university-provided workstations, regardless of their data classification, are required to run data-at-rest encryption software provided by Information Technology Services.  The specific products currently in use are provided in the Appendix. 

University servers 

All Sensitive servers and Restricted servers are required to use data-in-transit encryption.  All Restricted servers are required to use data-at-rest encryption.   The specific products currently in use are provided in the Appendix.  System administrators who plan to use a product not listed in the Appendix must discuss their planned encryption solutions with the Chief Information Security Officer prior to implementation.  

Exceptions 

All exceptions to this standard require written approval from the Chief Information Security Officer.  All exceptions require annual renewal. 

 

Appendix  

Encryption software – Windows workstations and servers 

All Windows workstations must run Microsoft BitLocker and be configured to report their encryption status through the university-maintained InTune service. 

Encryption software – Apple workstations 

All Apple workstations must run Apple FileVault and be configured to report their encryption status through the university-maintained JAMF service. 

Data-in-transit encryption 

When possible, data-in-transit encryption should be certificate-based.  Certificates should be provided by ITS or through Let’s Encrypt when possible and only purchased from third-party certificate authorities if neither of those choices can be used.  If certificate-based encryption is not an option then using PGP or GPG encryption to encrypt individual files that are being sent or received is acceptable. 

 

Revision History 

August 2024 – Standard adopted