Updated on 2025-05-22 GMT+08:00

SEC07-05 Transmission Data Encryption

Encrypt data during transmission to prevent data from being stolen, tampered with, or viewed by unauthorized users.

  • Risk level

    High

  • Key strategies
    • Using encryption protocols: Ensure that secure encryption protocols are used to encrypt data and protect it from being stolen or tampered with during transmission. Use the latest TLS version (TLS 1.2 or later) to ensure that the strongest encryption standard is used.
    • Secure transmission channel: Ensure that the data transmission channel is secure. Do not use insecure networks or public networks to transmit sensitive data.
    • Ensure that sensitive data is encrypted when being transmitted between the cloud and the client. In this way, data is difficult to be decrypted even if it is stolen.
    • E2E encryption: Use E2E encryption to ensure that data stays encrypted during transmission, that is, from the data generation end to the data receiving end. Use HTTPS to encrypt communication between clients and servers for web application APIs.
    • Data integrity verification: Use hash functions, digital signatures, and message authentication codes (MACs) to verify data integrity to ensure that data is not tampered with during transmission.
  • Related cloud services and tools
    • VPN
    • Direct Connect
    • Cloud Connect
    • Data Express Service (DES)
    • CCM