# O5.4 Conduct regular security audits to check encryption protocols

{% tabs %}
{% tab title="Principle" %}
[O5: Ensure data protection during use](https://safedpi.gitbook.io/safeguards/universal-dpi-safeguards-framework/principles/operational-principles/o5-ensure-data-protection-during-use)
{% endtab %}

{% tab title="Risk" %}
[RS2 Digital insecurity](https://safedpi.gitbook.io/safeguards/universal-dpi-safeguards-framework/risks/risks-to-safety), [RS1 Privacy vulnerability](https://safedpi.gitbook.io/safeguards/universal-dpi-safeguards-framework/risks/risks-to-structural-vulnerabilities)
{% endtab %}

{% tab title="Life Cycle Stage" %}
[L5: Operations & Maintenance](https://safedpi.gitbook.io/safeguards/universal-dpi-safeguards-framework/life-cycle-stages)
{% endtab %}
{% endtabs %}

## Practices

> * Implement automated monitoring tools to continuously check for vulnerabilities in encryption implementations and to ensure compliance with the latest security protocols.
> * Train the technical teams on the importance of strong encryption practices and the potential risks of outdated or weak encryption methods.
> * Document the results of security audits and encryption checks, and make necessary adjustments to improve the system’s security posture.

## Resources

<table data-view="cards"><thead><tr><th></th><th></th><th></th></tr></thead><tbody><tr><td>References</td><td></td><td></td></tr></tbody></table>
