Tips and Best Practices
- TLSv1.2 must be used for communication with Key Manager and database. 
- In cases where Java environment available with database do not support TLSv1.2 for establishing secure communication, then enable only the strongest possible SSL Ciphers on the Key manager to use TLSv1.2. 
- It is recommended that input data should have minimum two characters when using FPE encryption in remote mode. 
- It is recommended to use keys with stronger ciphers, such as AES. 
- It is recommended to apply IVs at the column-level. 
- It is recommended to use the Delete Old Data button after performing crypto operations. 
- Thales strongly discourages from manually modifying any of the metadata tables associated with CDP. 
- It is recommended to use CBC mode in case of standard encryption. 
- It is recommended not to use global keys for encryption/decryption. 
- User specified passwords, such as Client_Cert_Passphrase and Key_Store_Password should not be used as cryptographic keys. 
- It is recommended to obfuscate any password before using it.