Skip to site content

California Area Office logoCalifornia Area Office

Define the type of encryption, or cryptographic modules we should use and where we get them.

We're not able to discuss the specifics of IHS encryption in an FAQ, but all router to router packets are encrypted. Beyond that, we recommend that file system encryption be implemented at all sites. There are excellent open source tools that are Federal Information Processing Standards (FIPS) compliant available to accomplish this.