cryptography and encryption
there are two main types of Encryption Symmetric encryption AES128 or higher must be used AES256 must be used with external cloud service providers Other algorithms must not be used Asymmetric encryption RSA with a minimum key length of 2048 must be used The DH key exchange protocol should be used where appropriate for key exchange and must use a minimum key size of 2048 Private keys must be subject to periodic review to identify compromise Other Asymmetric Encryption must not be used Hash functions SHA-2 with a digest value of 256 or higher should be used SHA-3 may be used in place of SHA-2 MD5, SHA-1 must not be used except for file validation Other algorithms not listed must not be used Cryptographic salt should be used in combination with all implementations of hash functions except for file validation Cipher suites for SSL/TLS EECDH+AESGCM EDH+AESGCM AES256+EECDH AES256+EDH TLS v1.1 may be used to support legacy implementations TLS v1.2 shou...