Blog | G5 Cyber Security

Company PGP Implementation Guide

TL;DR

This guide outlines a practical approach to rolling out PGP (Pretty Good Privacy) encryption across your company, focusing on ease of use and security. It covers key generation, distribution, email client integration, and ongoing management.

1. Choose Your PGP Software

Several options are available. Consider these:

For this guide, we’ll assume GnuPG with Kleopatra as it strikes a good balance between power and usability.

2. Key Generation

  1. Install GnuPG & Kleopatra: Download from the official website and follow the installation instructions for your operating system.
  2. Generate a Master Key Pair: Open Kleopatra. Go to File > Generate Key Pair.
  3. Key Details: Enter your name, email address (company email is best), and a strong passphrase. Choose RSA and RSA (default size of 4096 bits is recommended).
  4. Key Usage: Ensure ‘Sign’ and ‘Encrypt’ are selected.
  5. Advanced Options: Consider setting an expiration date for the key. This adds a layer of security, requiring renewal after a period.
  6. Key Generation Process: Kleopatra will generate your keys. Move your mouse randomly to provide entropy (randomness).

Important: Back up your secret key securely! This is crucial for decryption and signing. Store it offline, encrypted if possible.

3. Key Distribution

Sharing public keys is essential. Avoid sending them as attachments (security risk). Use these methods:

To verify a key fingerprint:

gpg --fingerprint <email_address>

4. Email Client Integration

  1. Thunderbird: The most popular option for desktop email clients. Install the Enigmail extension (Enigmail website). Configure it to use your GnuPG installation.
  2. Outlook: Requires a commercial PGP plugin (e.g., Gpg4win Outlook Plugin) or using Kleopatra directly for signing and encrypting individual emails.
  3. Webmail (Gmail, etc.): Use Mailvelope. Install the extension and configure it to access your GnuPG key.

Configure email clients to automatically sign outgoing emails by default. Encryption should be optional, as not all recipients will use PGP.

5. Training & Policy

To revoke a key:

gpg --output revoke.asc --gen-revoke <key_id>

Store the revocation certificate securely.

6. Ongoing Management

Exit mobile version