Encryption Compliance: US Regulatory Requirements by Industry
US regulatory frameworks impose encryption obligations across healthcare, finance, federal contracting, and payment processing — each with distinct technical requirements, penalty structures, and enforcement bodies. This page maps the major compliance regimes by industry sector, identifies the specific encryption standards each framework references or mandates, and describes the structural boundaries between voluntary guidance and enforceable obligation. The material is organized as a reference for compliance professionals, legal counsel, technology officers, and researchers who need to locate specific requirements without working through primary regulatory text.
- Definition and scope
- Core mechanics or structure
- Causal relationships or drivers
- Classification boundaries
- Tradeoffs and tensions
- Common misconceptions
- Checklist or steps (non-advisory)
- Reference table or matrix
- References
Definition and scope
Encryption compliance refers to the set of legally binding, contractually enforceable, or regulatorily prescribed obligations that require organizations to apply cryptographic controls to specified categories of data. These obligations exist within a layered structure: federal statutes delegate rulemaking authority to agencies, which publish implementing regulations that reference technical standards — most frequently those published by the National Institute of Standards and Technology (NIST).
The scope of US encryption compliance spans five major sectors with distinct regulatory regimes:
- Healthcare: Governed primarily by HIPAA and the HITECH Act
- Federal government and contractors: Governed by FISMA, NIST SP 800-series standards, and the Cybersecurity Maturity Model Certification (CMMC) for defense contractors
- Financial services: Governed by the Gramm-Leach-Bliley Act (GLBA), state-level regulations such as the New York Department of Financial Services (NYDFS) Cybersecurity Regulation (23 NYCRR 500), and federal banking guidance
- Payment card processing: Governed by the Payment Card Industry Data Security Standard (PCI DSS), a contractual framework administered by the PCI Security Standards Council
- Consumer data (state level): Governed by statutes such as the California Consumer Privacy Act (CCPA) and associated regulations, with encryption treated as an affirmative defense against breach liability
The full landscape of available encryption service providers can be reviewed through the encryption providers maintained across this reference network.
Core mechanics or structure
Each regulatory framework structures its encryption requirements differently. The principal structural types are:
Prescriptive mandates: The regulation names a specific algorithm, key length, or protocol version. PCI DSS v4.0 (published March 2022 by the PCI Security Standards Council) requires TLS 1.2 or higher for all data in transit over open, public networks and explicitly prohibits SSL and TLS 1.0. This is a prescriptive, enumerated obligation.
Performance-based mandates: The regulation requires encryption without specifying the algorithm, leaving technical selection to the covered entity. HIPAA's Security Rule at 45 CFR § 164.312(a)(2)(iv) designates encryption of data at rest as an "addressable" specification — meaning covered entities must either implement it or document a compensating rationale. Encryption in transit is addressed under 45 CFR § 164.312(e)(2)(ii). Both specifications cross-reference NIST guidance through HHS's own implementation guidance rather than mandating a cipher suite.
Reference-based standards: The Federal Information Security Modernization Act (FISMA) requires federal agencies to comply with FIPS-validated cryptography. FIPS 197 establishes AES as the approved symmetric encryption standard. FIPS 140-3 governs validation requirements for cryptographic modules — a module that has not achieved FIPS 140 validation cannot be used in federal information systems for classified or sensitive data.
Contractual frameworks: PCI DSS operates not as a statute but as a condition of card brand participation. Non-compliance can trigger fines from card brands (Visa, Mastercard) rather than government enforcement, though state attorneys general may pursue separate action under state data protection statutes.
NIST SP 800-53 Rev 5, the primary control catalog for federal systems, specifies encryption requirements under control family SC (System and Communications Protection), particularly SC-8 (Transmission Confidentiality and Integrity) and SC-28 (Protection of Information at Rest). These controls cascade into contractor obligations through CMMC Level 2 and Level 3 requirements.
Causal relationships or drivers
Encryption compliance obligations proliferate for three structural reasons:
Breach liability and safe harbor: Multiple state breach notification statutes — including California's Civil Code § 1798.82 — exempt encrypted data from mandatory breach notification when the encryption key was not also compromised. This creates a direct economic incentive: encryption reduces regulatory notification burden and associated reputational costs.
Sectoral risk concentration: Healthcare organizations hold data subject to both HIPAA enforcement by the HHS Office for Civil Rights (OCR) and potential FTC Act Section 5 enforcement if representations about security are misleading. The OCR has imposed penalties in 90+ enforcement actions between 2003 and 2023, with settlement amounts reaching $16 million in individual cases (HHS OCR HIPAA Enforcement Results).
Federal procurement leverage: The Department of Defense (DoD) Cybersecurity Maturity Model Certification program requires defense contractors handling Controlled Unclassified Information (CUI) to encrypt CUI at rest and in transit per NIST SP 800-171 control 3.13.10 and 3.13.16. Loss of DoD contract eligibility constitutes a commercial consequence that drives adoption independent of direct regulatory penalties.
Interstate commerce scope: GLBA's Safeguards Rule, revised by the FTC in 2021 (16 CFR Part 314), requires financial institutions to encrypt customer information — both in transit and at rest — as part of a written information security program. The FTC enforces GLBA compliance against non-bank financial institutions including mortgage brokers, auto dealers, and tax preparers, extending encryption obligations far beyond traditional banking.
Classification boundaries
Encryption compliance requirements divide along four classification axes:
Data state: At-rest, in-transit, and in-use. Most current regulatory frameworks address the first two; confidential computing standards for data in use remain in NIST draft guidance stages as of NIST IR 8320.
Data sensitivity tier: HIPAA distinguishes Protected Health Information (PHI) from non-PHI. FISMA applies categorization levels (Low, Moderate, High) per FIPS 199, which determine minimum encryption requirements through the associated baselines in NIST SP 800-53.
Enforcement mechanism: Statutory (HIPAA, FISMA, GLBA), contractual (PCI DSS), and civil liability (state breach notification statutes). These operate independently — an organization can be PCI DSS compliant and still face state-level liability for a breach of unencrypted non-cardholder data.
Organizational scope: Federal agencies, federal contractors, covered entities under HIPAA, financial institutions under GLBA, and merchants under PCI DSS are discrete categories with non-overlapping primary regulators. A hospital that also accepts credit cards is subject to both HIPAA (OCR enforcement) and PCI DSS (card brand enforcement) simultaneously.
Understanding these boundaries informs how organizations should scope their encryption programs — a topic covered in greater structural detail within the reference.
Tradeoffs and tensions
Algorithm agility versus stability: NIST's post-quantum cryptography standardization process, which finalized the first three post-quantum standards in August 2024 (NIST IR 8413), creates a compliance tension. Organizations that have implemented AES-256 and RSA-2048 across legacy infrastructure face substantial rearchitecting costs to adopt ML-KEM (CRYSTALS-Kyber), ML-DSA, and SLH-DSA before NIST's harvest-now-decrypt-later advisory timelines require it.
Addressable versus required specifications under HIPAA: HIPAA's addressable designation for encryption at rest is frequently misread as optional. The Office for Civil Rights has consistently stated in guidance that "addressable" means a risk analysis must justify any non-implementation — not that the specification can be ignored. Organizations that treat addressable items as optional without documented risk assessments face enforcement exposure.
FIPS validation versus operational performance: FIPS 140-3 validated modules may lag behind the latest algorithm implementations by 12–24 months due to validation processing timelines at the Cryptographic Module Validation Program (CMVP). Federal contractors must use FIPS-validated modules even when newer, unvalidated implementations offer stronger or more efficient protection — creating a compliance-versus-security tension that NIST acknowledges in SP 800-175B.
Key management burden versus encryption coverage: Expanding encryption to all data categories — databases, backups, email archives, endpoint storage — increases key management complexity proportionally. BYOK architectures shift key custody to the customer but introduce operational risk if key recovery procedures are inadequate, potentially resulting in permanent data loss rather than breach.
Common misconceptions
Misconception: Encryption alone satisfies a compliance requirement.
Encryption is one control among multiple required controls. PCI DSS v4.0 Requirement 3 governs stored cardholder data and requires encryption alongside tokenization policies, key management procedures, and access restrictions. No single-control reading of any major framework treats encryption as a complete compliance program.
Misconception: HIPAA requires AES-256.
HIPAA does not name an algorithm. The Security Rule is technology-neutral. HHS guidance directs covered entities to NIST publications for algorithm selection guidance, but AES-256 is a recognized best practice rather than a statutory requirement. FIPS 197 approves AES at 128, 192, and 256-bit key lengths — all three are valid under HIPAA if properly implemented.
Misconception: PCI DSS is a government regulation.
The PCI DSS is administered by the PCI Security Standards Council, a private entity founded by the five major card brands. Compliance is a condition of card processing agreements, not a federal or state statute. Government enforcement enters only through state attorneys general pursuing separate consumer protection claims.
Misconception: Encrypting data at rest exempts an organization from breach notification under all state laws.
State breach notification statutes vary materially. California's safe harbor under Civil Code § 1798.82 applies to encrypted personal information. However, 13 states do not include an encryption safe harbor in their breach notification statutes, according to the National Conference of State Legislatures (NCSL). Coverage must be verified state by state.
Checklist or steps (non-advisory)
The following sequence describes the structural phases of an encryption compliance mapping exercise as commonly performed by compliance and security teams:
-
Identify all applicable regulatory frameworks — Determine which statutes, regulations, and contractual standards apply based on the organization's industry, data types processed, customer base, and federal contracting status.
-
Inventory data categories and states — Catalog data by sensitivity tier (PHI, PII, CUI, cardholder data), storage location, and transmission paths. Map each category to applicable framework definitions.
-
Cross-reference encryption requirements per framework — Extract specific encryption obligations from each applicable framework, distinguishing between prescriptive cipher requirements and performance-based mandates.
-
Evaluate FIPS validation status — For federal or DoD-contractor contexts, verify that cryptographic modules in use hold current FIPS 140-2 or FIPS 140-3 validation through the CMVP module search tool at csrc.nist.gov/projects/cryptographic-module-validation-program.
-
Document compensating controls and rationale — For any addressable HIPAA specification not implemented, prepare a documented risk analysis per 45 CFR § 164.308(a)(1).
-
Map key management procedures — Identify key generation, rotation, escrow, and destruction procedures for each encryption deployment. Confirm alignment with NIST SP 800-57 Part 1 Rev 5 recommendations.
-
Assess post-quantum readiness — Identify cryptographic dependencies on RSA, ECC, and Diffie-Hellman key exchange that will require migration per NIST's post-quantum transition guidance in NIST IR 8547 (initial public draft).
-
Verify state breach notification safe harbor coverage — For each state in which personal data of residents is held, confirm whether an encryption safe harbor applies and document its conditions.
Reference table or matrix
| Framework | Governing Body | Enforcement Mechanism | Encryption Requirement Type | Key Standard References |
|---|---|---|---|---|
| HIPAA Security Rule | HHS Office for Civil Rights | Civil/criminal penalties, corrective action plans | Performance-based (addressable) | NIST SP 800-111, NIST SP 800-52 Rev 2 |
| FISMA | OMB / Agency CIOs | Budget and contract consequences | Reference-based (FIPS mandatory) | FIPS 140-3, FIPS 197, NIST SP 800-53 Rev 5 |
| GLBA Safeguards Rule | FTC (non-bank); OCC/FDIC (banks) | Civil penalties, injunctions | Performance-based (written ISP required) | FTC 16 CFR Part 314 |
| NYDFS 23 NYCRR 500 | NY Dept. of Financial Services | Civil monetary penalties | Prescriptive (encryption required for NPI in transit and at rest) | 23 NYCRR 500.15 |
| PCI DSS v4.0 | PCI Security Standards Council | Card brand fines, loss of processing rights | Prescriptive (TLS 1.2+, AES) | PCI DSS v4.0 Requirements 3, 4 |
| CMMC Level 2 | DoD (OUSD A&S) | Contract award eligibility | Reference-based (NIST SP 800-171 required) | NIST SP 800-171 controls 3.13.10, 3.13.16 |
| CCPA / CPRA | California AG; California Privacy Protection Agency | Civil penalties up to $7,500 per intentional violation (Cal. Civ. Code § 1798.155) | Civil liability reduction (safe harbor) | Cal. Civ. Code § 1798.82 |
| FedRAMP | GSA / CISA Joint Authorization Board | Authorization denial or revocation | Reference-based (FIPS mandatory for CSPs) | FIPS 140-3, NIST SP 800-53 Rev 5 |
For a broader orientation to how this reference network structures encryption service categories, see how to use this encryption resource.