Documentation
HECVAT-onprem-v3.0.5
Datacenter
OPDC-08

Question OPDC-08

Does your system employ encryption technologies when transmitting sensitive information over TCP/IP networks (e.g., SSH, SSL/TLS, VPN), such as system-to-system and system-to-client?

Weight40
High RiskYes
RequiredYes
Compliant AnswerYes

Standard Guidance

EDUCAUSE provides no guidance here

Answering "NO"

Include all types of encryption; remote-access, application/database, end-user-to-system, etc.

Answering "YES"

Include all types of encryption; remote-access, application/database, end-user-to-system, etc.

Reason for Question

The need for encryption in transport is unique to your institution's implementation of a system. In particular, system components, architectures, and data flows all factor into the need for this control. Ensure that vendor responses cover encryption between the hosts within their system; this is the important piece that follows-up on OPDC-05.

Follow-Up Inquiries

Follow-up inquiries for data encryption within the system components (and end-users) will be institution/implementation specific.

HECVAT Pro Advice

[Add expert insights and best practices]

Implementation Tips

[Add practical steps for SME SaaS vendors]

FAQ

[Add common questions related to this HECVAT item]

Resources

[Add links to relevant articles or tools]