Secure storage

Ensuring organisations can securely store digital information.
Showing 15 results
Sort by: A-Z|Date
  • Backing up your data

    Guidance11 Oct 2017TopicsSecure storage

    5 things to consider when backing up your data.

  • Protecting Bulk Personal Data: Introduction

    Guidance25 Sep 2016TopicsDesign and configuration, Secure storage, Digital services

    To operate effective services, many organisations need to store and process large quantities of personal data

  • Bulk Data: 1-3 What are you protecting?

    Guidance25 Sep 2016TopicsDesign and configuration, Secure storage, Digital services

    It’s important to know what you are protecting and the risks you’ve already taken

  • Bulk Data: 4-7 Who has access to your data?

    Guidance25 Sep 2016TopicsDesign and configuration, Secure storage, Digital services

    You need to know that only those with a real need, have access to your data

  • Bulk Data: 8-15 How is your system designed, implemented and operated?

    Guidance25 Sep 2016TopicsDesign and configuration, Secure storage, Digital services

    Poor design, implementation or operations can result in data loss

  • Protecting Bulk Personal Data

    Guidance25 Sep 2016TopicsRisk management, Design and configuration, Secure storage, Digital services
  • 10 Steps: Removable Media Controls

    Guidance08 Aug 2016TopicsSecure storage, Cyber attacks

    This section from within the NCSC's '10 Steps To Cyber Security' concerns Removable Media Controls.

  • Full Disk Encryption - Authorisation Acquisition (CC Mapping): CPA SC

    Document08 Aug 2016TopicsIT infrastructure, Design and configuration, Secure storage, Assurance

    Full disk encryption protects the confidentiality of data at rest. Such solutions come in two parts – an encryption engine component that performs the bulk encryption and decryption of information, and an “Authorisation Acquisition” component covered by this Security ...

  • Full Disk Encryption - Encryption Engine (CC Mapping): CPA SC

    Document08 Aug 2016TopicsIT infrastructure, Secure storage, Assurance

    Full disk encryption solutions protect the confidentiality of data at rest. Such solutions come in two parts – an authorisation gathering component and an “Encryption Engine” which performs the bulk encryption and decryption of information. This combination protects data ...

  • Security Procedures Tabernus Enterprise Erase Revision 7

    Document01 Aug 2016TopicsDestruction and disposal, Secure storage

    These Security Procedures provide guidance in the secure operation of Tabernus Enterprise Erase 7.

  • Assured Service (CAS) Service Requirement Sanitisation

    Document01 Aug 2016TopicsDestruction and disposal, Secure storage

    CAS assessment against the Sanitisation Service requirement is a certification scheme to which commercial sanitisation services may subscribe; thus demonstrating compliance with IS5 when serving Government customers.

  • Keeping bulk personal data safe

    Information08 Jun 2016TopicsDigital services, Secure storage

    Good practices for the secure storage of sensitive data.

  • Software Encryption of Removable Media: CPA SC

    Document08 Feb 2016TopicsSecure storage, End user device, Assurance

    The primary purpose of a software disk encryption product is to protect the confidentiality of data at rest. Products can also provide some integrity protection of the protected data. This Security Characteristic does not define requirements for removable media encryption. Although some software ...

  • Hardware Media Encryption: CPA SC

    Document08 Feb 2016TopicsSecure storage, End user device, Assurance

    Hardware Media Encryption products are designed to maintain the confidentiality of data on mass storage devices through the addition of cryptographic hardware. These devices must enclose the encryption capabilities within an anti-tamper boundary, providing assurance over the integrity of the ...

  • Software Full Disk Encryption: CPA SC

    Document08 Feb 2016TopicsIT infrastructure, Secure storage, Assurance

    The primary purpose of a software disk encryption product is to protect the confidentiality of data at rest. Products can also provide some integrity protection of the protected data. This Security Characteristic (SC) does not define requirements for removable media encryption. Although some ...