This document is under active development and has not been finalized.
Skip to content

Cryptography

LEGAL BASIS

§30(2) No. 8 BSIG – Concepts and procedures for the use of cryptography and, where appropriate, encryption

Standards

BAUER GROUP follows BSI (TR-02102) and ISO/IEC 27001 Annex A.10 recommendations:

AreaStandardMinimum Requirement
Symmetric encryptionAESAES-256
Asymmetric encryptionRSA / ECDSARSA-4096 / ECDSA P-384
Hash functionsSHA-2 / SHA-3SHA-256+
TLSTLS 1.2+TLS 1.3 preferred
Key derivationPBKDF2 / Argon2Argon2id preferred

Encryption

Data at Rest

  • Full disk encryption on all server systems
  • Database encryption for sensitive data
  • Backup encryption (AES-256)

Data in Transit

  • TLS 1.2+ for all external connections, TLS 1.3 preferred
  • SSH for server administration (Ed25519 keys)
  • VPN for remote access to internal systems

Key Management

AspectImplementation
Key generationCryptographically secure random generators
Key storageEncrypted storage, access control
Key rotationAt least annually for long-term keys
Key destructionSecure deletion on decommissioning

Certificate Management

  • Let's Encrypt for public TLS certificates (automated renewal)
  • Certificate expiry monitoring
  • Documented processes for certificate renewal and revocation

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT