Encryption: The Complete Guide for Compliance and Security Teams
2026-03-08
By Emre Salmanoglu

Encryption: The Complete Guide for Compliance and Security Teams

Learn how encryption protects data at rest, in transit, and in use. Covers AES, RSA, TLS, key management, and compliance requirements under ISO 27001, SOC 2, NIS2, DORA, and GDPR.

encryption
data protection
cryptography
key management
compliance

What Is Encryption?

Encryption is the process of converting readable data (plaintext) into an unreadable format (ciphertext) using a mathematical algorithm and a cryptographic key. Only authorised parties with the correct decryption key can reverse the process and access the original data.

For compliance and security teams, encryption is not optional — it is a foundational control required by virtually every major security framework and regulation.

Types of Encryption

Symmetric vs Asymmetric

PropertySymmetric EncryptionAsymmetric Encryption
KeysSingle shared keyPublic-private key pair
SpeedFast — suitable for bulk dataSlower — used for key exchange and signatures
Common algorithmsAES-128, AES-256, ChaCha20RSA-2048, RSA-4096, ECC P-256, Ed25519
Use casesDatabase encryption, disk encryption, file encryptionTLS handshake, digital signatures, PGP email
Key distribution challengeMust securely share the keyPublic key can be freely distributed
Compliance standardAES-256 accepted universallyRSA-2048 minimum for most frameworks

Hybrid Encryption

Modern systems use hybrid encryption — asymmetric encryption to securely exchange a symmetric key, then symmetric encryption for the actual data. TLS (HTTPS) is the most common example: the TLS handshake uses RSA or ECC to agree on an AES session key.

Encryption States

StateWhat It ProtectsCommon MechanismsCompliance Requirement
At restStored data — databases, files, backupsAES-256, LUKS, BitLocker, TDE, cloud KMSISO 27001 A.8.24, SOC 2 CC6.1, GDPR Art. 32
In transitData moving between systemsTLS 1.2/1.3, IPsec, SSH, SFTPISO 27001 A.8.24, SOC 2 CC6.7, NIS2 Art. 21
In useData being processed in memoryConfidential computing, Intel SGX, AMD SEV, homomorphic encryptionEmerging — not yet widely mandated

Encryption at Rest

Encryption at rest protects data stored on disk, in databases, or in cloud storage. Key approaches:

ApproachDescriptionBest For
Full-disk encryption (FDE)Encrypts the entire storage volumeLaptops, workstations, portable devices
File-level encryptionEncrypts individual files or directoriesSelective protection of sensitive files
Database encryption (TDE)Transparent Data Encryption at the database engine levelStructured data in SQL/NoSQL databases
Cloud-managed encryptionCloud provider encrypts storage automatically (AWS S3, Azure Blob)Cloud-native workloads
Application-level encryptionApplication encrypts data before writing to storageMaximum control, field-level protection

Encryption in Transit

ProtocolVersionStatusNotes
TLS1.3RecommendedFastest, most secure, fewer round trips
TLS1.2AcceptableStill widely used, configure strong cipher suites
TLS1.0, 1.1DeprecatedMust be disabled — known vulnerabilities
SSLAllObsoleteNever use — critically insecure
IPsecIKEv2RecommendedVPN and network-level encryption
SSHv2RequiredRemote administration and file transfer

Cryptographic Algorithms: What to Use and What to Avoid

CategoryRecommendedAvoid
SymmetricAES-256-GCM, ChaCha20-Poly1305DES, 3DES, RC4, Blowfish
AsymmetricRSA-2048+, ECC P-256+, Ed25519RSA-1024, DSA
HashingSHA-256, SHA-3, BLAKE2MD5, SHA-1
Key derivationArgon2, bcrypt, scryptPBKDF2 with low iterations, plain hashing
MACsHMAC-SHA256, Poly1305HMAC-MD5

Algorithm Selection Criteria

  1. Regulatory acceptance — AES-256 and RSA-2048 are accepted by all major frameworks
  2. Performance requirements — AES-GCM for server workloads, ChaCha20 for mobile/IoT
  3. Post-quantum readiness — Monitor NIST PQC standards (CRYSTALS-Kyber, CRYSTALS-Dilithium)
  4. Key length — Minimum 128-bit symmetric, 2048-bit RSA, 256-bit ECC

Key Management

Encryption is only as strong as your key management. A perfectly encrypted database is worthless if the keys are stored in plaintext next to it.

Key Lifecycle

PhaseBest PracticeCommon Mistake
GenerationUse cryptographically secure random number generators (CSPRNG)Using predictable seeds or weak RNGs
StorageStore in HSM, cloud KMS, or dedicated vault (HashiCorp Vault)Storing keys in source code, config files, or environment variables
DistributionUse secure key exchange protocols (TLS, Diffie-Hellman)Sending keys via email or chat
RotationAutomate rotation on schedule and after incidentsNever rotating keys
RevocationImmediately revoke compromised keysDelayed revocation after breach
DestructionCryptographic erasure — securely destroy all copiesLeaving old keys accessible

Key Management Services

ServiceTypeBest For
AWS KMSCloud-managedAWS-native workloads
Azure Key VaultCloud-managedAzure-native workloads
Google Cloud KMSCloud-managedGCP-native workloads
HashiCorp VaultSelf-managed / SaaSMulti-cloud, secrets management
Hardware Security Module (HSM)HardwareHighest assurance, regulatory requirements

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2GDPRNIS2DORA
Encryption at restA.8.24CC6.1Art. 32Art. 21(2)(d)Art. 9(2)
Encryption in transitA.8.24CC6.7Art. 32Art. 21(2)(d)Art. 9(2)
Key managementA.8.24CC6.1Art. 32Art. 21(2)(d)Art. 9(2)
Cryptographic policyA.8.24CC6.1Art. 21(2)(h)Art. 9(4)(c)
Algorithm standardsA.8.24CC6.1Recital 83Art. 21(2)(h)Art. 9(4)(c)
Incident response for key compromiseA.5.26CC7.3Art. 33-34Art. 23Art. 19

GDPR and Encryption

GDPR provides a strong incentive to encrypt personal data:

  • Article 32 — Lists encryption as an appropriate technical measure
  • Article 34 exemption — If breached data was encrypted and keys remain secure, you may not need to notify individuals
  • Pseudonymisation — Encryption supports GDPR's pseudonymisation requirements

Audit Evidence for Encryption

Evidence TypeDescriptionFramework
Encryption policy documentApproved policy covering algorithms, key lengths, and managementISO 27001, SOC 2
Key management proceduresDocumented lifecycle for generation, rotation, and destructionAll frameworks
TLS configuration scansSSL Labs or similar scan results showing TLS 1.2+SOC 2, NIS2
At-rest encryption proofCloud console screenshots or configuration exportsAll frameworks
Key rotation logsAutomated rotation records from KMSISO 27001, SOC 2
Certificate inventoryComplete list of all certificates with expiry datesNIS2, DORA
Penetration test resultsTesting encryption implementation effectivenessISO 27001, NIS2
Crypto algorithm inventoryList of all algorithms in use with deprecation timelineDORA, NIS2

Common Mistakes

MistakeRiskFix
Storing encryption keys alongside encrypted dataBreach exposes both data and keysUse external KMS or HSM
Using deprecated algorithms (MD5, SHA-1, DES)Known vulnerabilities, audit findingsMigrate to AES-256, SHA-256 minimum
Not encrypting backupsBackup theft exposes all dataApply same encryption policy to backups
Hardcoding keys in source codeKeys leak through version controlUse secrets management (Vault, KMS)
Missing key rotationLonger exposure window if key is compromisedAutomate annual rotation minimum
TLS 1.0/1.1 still enabledCompliance failure, known attack vectorsDisable and enforce TLS 1.2+
No crypto algorithm inventoryCannot prove compliance or plan migrationsMaintain and review quarterly

How Orbiq Supports Encryption Compliance

Orbiq helps you demonstrate and manage encryption controls:

  • Evidence collection — Automatically gather encryption configuration evidence from cloud providers
  • Policy templates — Pre-built cryptographic policy templates aligned to ISO 27001 and SOC 2
  • Continuous monitoring — Track TLS configurations, certificate expiry, and encryption status
  • Trust Center — Share your encryption posture with customers and auditors through your Trust Center
  • Audit readiness — Map encryption controls to framework requirements with pre-built control mappings

Further Reading