Enhancing Data Encryption Techniques for Developers

Explore various data encryption methods to protect sensitive information in transit and at rest.

0 likes
18 views

Rule Content

{
  "title": "Enhancing Data Encryption Techniques for Developers",
  "description": "Explore various data encryption methods to protect sensitive information in transit and at rest.",
  "category": "Security",
  "rules": [
    {
      "id": "ENCRYPTION_ALGORITHM_USAGE",
      "description": "Ensure the use of strong, industry-standard encryption algorithms for data protection.",
      "severity": "error",
      "patterns": [
        {
          "pattern": "DES|3DES|RC4",
          "message": "Avoid using weak encryption algorithms like DES, 3DES, or RC4. Use AES-256 for symmetric encryption and RSA-2048 for asymmetric encryption instead."
        }
      ]
    },
    {
      "id": "KEY_MANAGEMENT_PRACTICES",
      "description": "Implement secure key management practices to safeguard encryption keys.",
      "severity": "error",
      "patterns": [
        {
          "pattern": "hardcoded_key",
          "message": "Avoid hardcoding encryption keys in the source code. Use secure key management systems such as AWS KMS or Azure Key Vault."
        }
      ]
    },
    {
      "id": "DATA_IN_TRANSIT_ENCRYPTION",
      "description": "Ensure data in transit is encrypted using secure protocols.",
      "severity": "error",
      "patterns": [
        {
          "pattern": "http://",
          "message": "Use HTTPS to encrypt data in transit. Ensure TLS 1.3 is implemented for secure communication."
        }
      ]
    },
    {
      "id": "DATA_AT_REST_ENCRYPTION",
      "description": "Ensure sensitive data at rest is encrypted to prevent unauthorized access.",
      "severity": "error",
      "patterns": [
        {
          "pattern": "plaintext_storage",
          "message": "Avoid storing sensitive data in plaintext. Use AES-256 encryption for data at rest."
        }
      ]
    },
    {
      "id": "POST_QUANTUM_CRYPTOGRAPHY",
      "description": "Prepare for post-quantum cryptography by adopting quantum-resistant algorithms.",
      "severity": "warning",
      "patterns": [
        {
          "pattern": "RSA-2048",
          "message": "Consider transitioning to quantum-resistant algorithms like those standardized by NIST, such as ML-KEM (FIPS 203) and ML-DSA (FIPS 204)."
        }
      ]
    }
  ]
}