Prepared by MatrixIT.net
Client: ____________________ Date: ____________________
The monitoring period is complete. You’ve had Actifile identifying and classifying your sensitive data for the recommended period. Now we move to active protection — enabling encryption and data protection policies. In this meeting we will:
Agents installed, tenant configured
Scan, classify, map sensitive data
Encryption, rules, allowlisting
Alerts, risk tracking, compliance
Before enabling encryption, let’s review what the monitoring period revealed about your environment:
Files encrypted at rest but accessible normally to authorized users and applications. Zero workflow disruption.
Government-grade encryption standard. Required by many financial regulators and CIS Controls IG2/IG3.
If a file is copied, emailed, or stolen — it remains encrypted and unreadable outside your environment.
By classifier match during continuous scan
Check: encrypt, alert, or log?
Transparent to allowlisted apps; locked for others
When an authorized user opens an encrypted file with an allowlisted application, Actifile automatically decrypts it in memory. The user sees no difference. When saved, it’s re-encrypted. If the same file is accessed by an unauthorized app or copied to a USB drive, it remains encrypted and unreadable.
Actifile Portal – Encryption Wizard
Application allowlisting must be configured before enabling encryption. Without it, authorized applications may be unable to access encrypted files, causing workflow disruption. This is the single most important preparation step.
| Category | Examples | Action |
|---|---|---|
| Core Banking / CU Systems | Core banking platform, loan origination, member management | Allowlist all executables |
| Office Productivity | Microsoft Office (Word, Excel, Outlook), Adobe Acrobat | Allowlist (usually pre-configured) |
| Web Browsers | Chrome, Edge, Firefox — for internal portals/sites | Allowlist trusted internal sites |
| Backup Software | Veeam, Acronis, BackupExec, cloud backup agents | Allowlist to ensure encrypted files are backed up correctly |
| AV/EDR Scanners | CrowdStrike, SentinelOne, Sophos, Defender | Allowlist scanning processes |
| Internal Tools | RMM agents, HR systems, compliance tools, scanners | Review and allowlist case-by-case |
| Cloud Sync | OneDrive, SharePoint sync, Dropbox (if approved) | Allowlist sync agents |
List all applications and sites that need access to encrypted sensitive files:
| Application / Process Name | Executable Path | Reason |
|---|---|---|
Actifile Portal – Application Allowlisting Configuration
Protection rules define what happens when Actifile detects sensitive data. Rules are classifier-driven and can be layered.
Automatically encrypt files matching a classifier. Strongest protection — files unreadable if stolen.
Use for: PII, financial records, member data, loan documents, SIN numbers
Send notification when sensitive file is detected, moved, copied, or modified. No encryption.
Use for: Lower-risk data, audit trail, compliance evidence
Move sensitive files to a secure location pending review. For highly sensitive or unexpected findings.
Use for: Unexpected data locations, policy violations, suspect files
Record detection in the audit trail without taking action. Useful for extended monitoring.
Use for: New classifier testing, low-sensitivity categories
| Data Type / Classifier | Action | Scope | Approved |
|---|---|---|---|
| Social Insurance Numbers (SIN) | Encrypt | All devices | |
| Credit Card / PAN numbers | Encrypt | All devices | |
| Bank account numbers | Encrypt | All devices | |
| Loan / mortgage documents | Encrypt | All devices | |
| Member PII (names + addresses) | Alert + Encrypt | All devices | |
| Internal policy documents | Log | Pilot group | |
| _________________ | _______ | _______ |
Encryption should be enabled in stages to minimize risk and allow for troubleshooting:
Enable encryption on a small pilot group (5–10 devices, IT-savvy users). Test all allowlisted applications. Verify no workflow disruption.
Expand to one full department (e.g., back office or accounting). Address any allowlisting gaps found during pilot.
Enable encryption across all remaining devices. Tellers, front-line staff, remote workers. Full protection active.
Extend protection policies to cloud storage and NAS shares. Verify scan intervals and protection consistency.
If encryption causes issues, Actifile provides multiple decryption options:
AFDecryptor command-line tool for manual decryptionAFIsEncrypted tool to check encryption status of individual filesFIPS 140-2 is a US/Canadian government standard for cryptographic modules. For credit unions following CIS Controls IG2/IG3, enabling FIPS compliance ensures your encryption meets the CIS Control 3.6 (encrypt data on end-user devices) and 3.11 (encrypt sensitive data at rest) requirements at the highest standard.
Standard AES-256 encryption. Suitable for most environments. Faster performance.
FIPS 140-2 validated cryptographic module. Required by some regulators. Slight performance overhead.
Actifile offers tamper resistance to prevent unauthorized removal of the agent. When enabled, an uninstall key is required to remove Actifile from any device. MatrixIT recommends enabling this for all credit union deployments.
Uninstall key stored by:
With encryption enabled, your credit union gains coverage for these additional CIS Control 3 safeguards:
| Control | Safeguard | Status After This Meeting |
|---|---|---|
| 3.6 | Encrypt data on end-user devices | Active |
| 3.9 | Encrypt data on removable media | Active |
| 3.11 | Encrypt sensitive data at rest | Active |
| 3.12 | Segment data processing and storage based on sensitivity | Active |
| 3.13 IG3 | Deploy a data loss prevention solution | Active |
When Actifile encrypts files, your backup solution will back up the encrypted versions. This is by design — backups of encrypted files are still protected. However, you should verify:
The pilot is successful when:
Support: support.actifile.com
Portal: app.actifile.com
Encryption FAQ: Encryption FAQ
Allowlisting: Allowlisting Guide