1. Administration and security
  2. Bring Your Own Key
  3. Glossary of Encryption Events and Terms
Term

Definition

Encryption Process
add guardpoint with Policy = AuditKey_encrypt_dxformPolicy The workspace specified in the Object ID attribute of the log is about to be encrypted. Access to the workspace is temporarily restricted so nothing can be added or removed during the encryption process. These are the steps of an encryption process for a workspace
marked guardpoint pending delete with Policy = AuditKey_encrypt_dxformPolicy The workspace is encrypted.
delete pending guardpoint with Policy = AuditKey_encrypt_dxformPolicy The restriction preventing all access during encryption is removed.
add guardpoint with Policy = AuditKey_policy Setting the policy and access control on the workspace. From this point forward, when files are added to the encrypted workspace, they are encrypted as they are added.
Decryption Process
marked guardpoint pending delete with Policy = AuditKey_policy The workspace specified in the Object ID attribute of the log is about to be decrypted. About to remove the policy that allows access to the workspace so the data can be safely decrypted. These are the steps of the decryption process for a workspace.
delete pending guardpoint with Policy = AuditKey_policy Access to the workspace is temporarily disabled so that nothing can be added or removed during the decryption process.
add guardpoint with Policy = AuditKey_decrypt_dx_formPolic The workspace is set to be decrypted.
marked guardpoint pending delete with Policy = AuditKey_decrypt_dxformPolicy The workspace is decrypted. About to remove the restrictions to access the workspace.
delete pending guardpoint with Policy = AuditKey_decrypt_dxformPolicy The workspace was decrypted and access restored.
General Terms
Asymmetric cryptography Also known as public key cryptography uses public and private keys to encrypt and decrypt data. The key that is exported from Anaplan is the public key of the pair and the algorithm used is RSA 2048. This will be used to wrap a symmetric key.
Create symmetric key An Encryption Administrator created an encryption key in BYOK.
Symmetric cryptography Uses the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
Update key An Encryption Admin updated the reminder date of an encryption key in BYOK.
Wrapped key An AES-256 symmetric key wrapped in an asymmetric key generated from Anaplan.