PCI-DSS 4.0 Req-12.3 requires organizations to document their cryptographic inventory — which algorithms are in use, where, and with what key lengths. NIST SC-13 requires documentation of approved cryptographic modules. Without this documentation, compliance auditors (QSAs, FFIEC examiners) cannot verify that encryption meets the required standards, and internal teams cannot make informed decisions when upgrading or rotating algorithms. A SECURITY.md that says "we encrypt sensitive data" without naming the algorithm or key length cannot satisfy either framework. Documentation gaps also create drift risk: without a written spec, different developers may implement different algorithms across services.
Low because missing documentation is an audit and governance failure rather than an active exploit path, but it blocks PCI-DSS QSA approval and creates conditions for algorithm drift.
Create SECURITY.md in the repo root (or a dedicated docs/encryption.md) and document at least three encryption aspects: algorithm name, key length, and cipher suite or mode. Template:
# Encryption Overview
## Data at Rest
- Algorithm: AES-256-GCM
- Key length: 256 bits
- Mode: GCM (authenticated encryption, provides integrity + confidentiality)
- Key storage: AWS KMS (key ID documented in `docs/kms-inventory.md`)
## Data in Transit
- Protocol: TLS 1.3 (minimum TLS 1.2)
- Cipher suites: TLS_AES_256_GCM_SHA384, ECDHE-RSA-AES256-GCM-SHA384
- Certificate authority: Let's Encrypt (auto-renewed)
- HSTS: Enabled (max-age=63072000)
## Password Hashing
- Algorithm: Argon2id (NIST SP 800-63B-4)
- Parameters: m=65536, t=3, p=4
## Last updated: 2026-04-01
Link this document from the deployment checklist so it's reviewed before each production release.
finserv-encryption.pci-alignment.encryption-documentationlow"0 documentation files reference encryption — algorithm and key length choices undocumented" or "SECURITY.md mentions 'AES encryption' but only 1 of 3 required aspects specified (missing key length and cipher suite)"# Encryption Overview
## Data at Rest
- Algorithm: AES-256-GCM
- Key length: 256 bits
- Key storage: AWS KMS
- Key rotation: Automatic (annually)
## Data in Transit
- Protocol: TLS 1.3
- Minimum TLS: TLS 1.2
- Cipher suites: TLS13:TLS_AES_256_GCM_SHA384:ECDHE-RSA-AES256-GCM-SHA384
- Certificate validation: Enabled
## Hashing (Passwords/Auth)
- Algorithm: Argon2id / bcrypt
- Parameters: [specific config]