Brask Inc
This policy defines organizational requirements for the use of cryptographic controls, as well as the requirements for cryptographic keys, in order to protect the confidentiality, integrity, authenticity, and nonrepudiation of information.
This policy applies to all systems, equipment, facilities and information within the scope of
Rask AI information security program. All employees, contractors, part-time, and temporary workers, service providers, and those employed by others to perform work on behalf of the organization having to do with cryptographic systems, algorithms, or keying material are subject to this policy and must comply with it.
This policy defines the high level objectives and implementation instructions for Rask AI use of cryptographic algorithms and keys. It is vital that the organization adopt a standard approach to cryptographic controls across all work centers in order to ensure end-to-end security, while also promoting interoperability. This document defines the specific algorithms approved for use, requirements for key management and protection, and requirements for using cryptography in cloud environments.
The Brask ML Infrastructure Department maintains and updates this policy. The CEO and legal department approve this policy and any changes.
Rask AI protects individual systems and information using cryptographic controls as outlined below:
Organizationally-approved encryption must comply with relevant local and international laws, including import/export restrictions. The encryption used by Rask AI meets international standards and U.S. requirements, allowing for international use.
Keys must be managed by their owners and protected against loss, change, or destruction. Appropriate access control and regular backups are mandatory.
All key management must be performed using software that automatically manages key generation, access control, secure storage, backup and rotation of keys. Specifically:
Secret (symmetric) keys must be securely distributed and protected at rest with stringent security measures.
Public key cryptography uses public-private key pairs. The public key is included in a digital certificate issued by a certificate authority, while the private key remains with the end user.