Cryptographic Keys complete

Control over encryption keys, key management systems, and cryptographic operations

L0 Unaware

No encryption policy exists. Default provider-managed encryption may be active but is neither understood nor governed. Key custody, rotation, and lifecycle management are entirely unconsidered.

Criteria

  • KEYS-L0-C1 No formal encryption policy or standard has been defined for data at rest or in transit.
    Evidence guidance

    Request the organisation's encryption policy or information security policy. Absence of any documented encryption requirements satisfies this criterion.

  • KEYS-L0-C2 Encryption keys are entirely provider-managed with no organisational awareness of key custody arrangements.
    Evidence guidance

    Interview IT leadership regarding who holds encryption keys and where key material resides. Lack of knowledge or 'the cloud provider handles it' responses confirm this criterion.

  • KEYS-L0-C3 No key rotation schedule or key lifecycle management process is in place.
    Evidence guidance

    Request documentation of key rotation policies or automated rotation configurations. Complete absence satisfies this criterion.

Indicators

  • No encryption policy document exists in the organisation's policy framework.
  • IT staff cannot identify where encryption keys are stored or who controls them.
  • Default provider encryption is active but not formally acknowledged or governed.

Regulatory mappings

RegulationArticlesRiskNote
GDPRart-32highArticle 32 requires appropriate technical measures including encryption. Absence of any encryption governance fails to demonstrate appropriateness.
NDSGart-8highData security obligations under nDSG Art. 8 require technical measures proportionate to risk. No encryption awareness represents a significant gap.
NIS2art-21highNIS2 Art. 21 mandates policies on cryptography. Complete absence of encryption governance is non-compliant.

Upgrade path

Establish a basic encryption policy. Inventory all systems and identify which provider-managed encryption is active. Document current key custody arrangements, even if they are entirely provider-controlled.

Risk if stagnant

Data breaches may go undetected due to lack of encryption awareness. Regulatory non-compliance with GDPR Art. 32 and NIS2 Art. 21 exposes the organisation to enforcement action. Foreign government access to unmanaged keys under the CLOUD Act cannot be assessed or mitigated.

Typical characteristics
  • No encryption policy or standard is documented.
  • The organisation cannot articulate who holds key material or under which jurisdiction keys reside.
  • Key rotation does not occur, or occurs solely at provider discretion without organisational awareness.
  • There is no distinction between encryption of data at rest, in transit, or in use.
  • CLOUD Act exposure through US-headquartered providers is neither assessed nor mitigated.
Typical evidence
  • Absence of encryption-related policies in the information security management system.
  • Interview responses indicating encryption is "handled by the cloud provider" with no further detail.
  • No key management entries in asset inventories or configuration management databases.
Why this is dangerous

Organisations at Level 0 face significant regulatory exposure. GDPR Art. 32 requires encryption as a technical safeguard, and the inability to demonstrate deliberate encryption governance undermines compliance posture. In the event of a breach, the inability to confirm encryption status (GDPR Art. 34) may trigger mandatory notification to data subjects. Under NIS2, the absence of cryptography policies constitutes a direct compliance gap for entities in scope.