Elements and Performance Criteria
- Determine encryption methods
- Analyse enterprise data security requirements
- Create a new or review an existing security plan to determine appropriate encryption methods
- Review a range of encryption technologies and rank the most appropriate options
- Assess the costs associated with each encryption option
- Document encryption options and costs and forward to appropriate person for decision
- Implement encryption
- Monitor encryption
- Analyse implementation of the encryption technologies, confirming function and performance
- Review help-desk records for problems concerning implementation and take appropriate action
- Review system logs for encryption issues and compromises
- Document encryption issues and compromises, notifying appropriate person