Encrypt Sensitive Data in Transit
Description
Encrypt sensitive data in transit. Example implementations can include: Transport Layer Security (TLS) and Open Secure Shell (OpenSSH).
Implementation Checklist
Tool Recommendations
Data governance and compliance platform with DLP, information protection, sensitivity labels, and insider risk management
Microsoft · Per-user subscription (E5/standalone)
Enterprise data loss prevention covering endpoint, network, storage, and cloud channels with policy-based content inspection
Broadcom · Enterprise license
Cloud-native DLP and CASB platform providing inline data protection for SaaS, IaaS, web, and endpoint
Netskope · Per-user subscription
Threats & Vulnerabilities (CIS RAM)
Threat Scenarios
Man-in-the-Middle Interception of Sensitive Data
ConfidentialityAttackers on the network path intercept unencrypted sensitive data in transit via ARP spoofing, DNS hijacking, or compromised network equipment, capturing credentials and business data.
Credential Harvesting via Unencrypted Protocols
ConfidentialityAuthentication credentials transmitted over unencrypted protocols like HTTP, FTP, or Telnet are captured by network sniffers, enabling account takeover attacks.
Data Manipulation in Transit
IntegrityWithout transit encryption, attackers modify data in flight between systems, injecting malicious content or altering financial transactions without detection.
Vulnerabilities (When Safeguard Absent)
Sensitive Data Transmitted in Cleartext
Without enforced encryption for data in transit, sensitive information including credentials, PII, and financial data traverses networks in readable plaintext.
No Enforcement of Encrypted Protocols
Systems and applications allow fallback to unencrypted protocols, enabling downgrade attacks and unintentional cleartext transmission of sensitive data.
Evidence Requirements
| Type | Evidence Item | Collection Frequency |
|---|---|---|
| Technical | Configuration screenshots or exports showing protection controls enabled | Captured quarterly |
| Document | Procedure documentation for protection measures | Reviewed annually |
| Technical | Encryption configuration evidence (disk encryption status, TLS settings) | Scanned monthly |
| Document | Key management procedures and key rotation records | Reviewed annually |
| Document | Governing policy document (current, approved, communicated) | Reviewed annually |