Encryption is fundamental to document signing security, but not all encryption implementations are equal. This article examines the specific encryption standards relevant to regulated document signing platforms.
Encryption in a document signing context serves two distinct purposes. Encryption in transit protects documents and signing data as they move between the signer's browser and the signing platform, and between the platform and its storage layer. Encryption at rest protects documents and audit data while stored, ensuring that a compromise of the storage layer does not expose document content.
For regulated industries, encryption is not optional — it is a baseline expectation. The NCSC, FCA, PRA, and ICO all reference encryption as a fundamental security control. But stating that a platform "uses encryption" is insufficient. Regulators and security teams need specifics: which algorithms, which key lengths, which protocols, and how keys are managed.
Transport Layer Security (TLS) is the protocol that encrypts data as it moves across networks. TLS 1.3, published as RFC 8446 in August 2018, is the current standard and represents a significant improvement over its predecessors.
Ratifio implements AES-256 encryption at rest via AWS KMS with automatic key rotation, TLS 1.3 for all data in transit, and encrypted database connections — no unencrypted data paths exist in the architecture.
Review Ratifio's encryption architecture →Key improvements in TLS 1.3 relevant to document signing:
For regulated platforms, the NCSC recommends TLS 1.2 as the minimum acceptable version, with TLS 1.3 as the preferred version. TLS 1.0 and 1.1 should be disabled entirely — they contain known vulnerabilities that cannot be fully mitigated.
The Advanced Encryption Standard (AES) with a 256-bit key is the standard for encrypting stored data. AES-256 is approved by GCHQ/NCSC for protecting information classified up to SECRET, making it more than sufficient for OFFICIAL and OFFICIAL-SENSITIVE government documents and for regulated financial services data.
Every document uploaded to Ratifio is SHA-256 hashed before any signer accesses it, providing cryptographic proof of original state that is independent of the encryption layer and verifiable by any standard tool.
Explore document integrity features →In a cloud-hosted document signing platform, AES-256 at rest is typically implemented through the cloud provider's key management service. In AWS, this means:
S3 server-side encryption (SSE-KMS). Documents stored in S3 are encrypted using AES-256 with keys managed by AWS Key Management Service (KMS). Each object is encrypted with a unique data key, which is itself encrypted with a KMS master key. This envelope encryption ensures that compromise of a single data key exposes only one object.
RDS encryption. Database volumes are encrypted using AES-256 with KMS keys. This encrypts not just the database files but also automated backups, read replicas, and snapshots. Once enabled, encryption cannot be disabled — a useful property for compliance.
EBS volume encryption. Any temporary storage used during document processing (such as PDF merging) is encrypted at the volume level, ensuring that document data is never written to unencrypted storage, even transiently.
Encryption is only as strong as its key management. A perfectly encrypted document is worthless if the key is stored alongside it, accessible to anyone who can access the encrypted data. Key management for document signing platforms should adhere to several principles:
The question a regulator will ask is not "do you encrypt data?" It is "who can decrypt it, and how do you know?"
The National Cyber Security Centre publishes guidance on cryptographic standards that is particularly relevant to government and regulated industry platforms. Key NCSC recommendations include:
For document signing platforms handling particularly sensitive data, several additional cryptographic controls may be appropriate:
Client-side encryption. Documents encrypted by the client before upload ensure that the signing platform never has access to plaintext document content at rest. This is a strong control but adds complexity to the signing workflow, as the platform must decrypt the document for display to signers.
Document-level encryption keys. Rather than encrypting all documents with the same master key, each document (or each campaign) can be encrypted with a unique key. Compromise of one key exposes only one document, not the entire corpus.
Cryptographic audit trail integrity. As discussed in our article on tamper-proof audit trails, hash chains provide cryptographic proof that audit records have not been modified. This is a complementary control to encryption — encryption protects confidentiality, while hash chains protect integrity.
Different regulatory frameworks reference encryption in different terms. The following mapping helps compliance teams understand which encryption controls satisfy which requirements:
Encryption for document signing is not a single technology decision. It is a layered architecture: TLS 1.3 in transit, AES-256 at rest, KMS-managed keys with automatic rotation, audited key access, and cryptographic integrity for audit trails. Each layer addresses a different threat, and each is required by one or more regulatory frameworks. The platforms that get this right are not the ones that encrypt data — nearly every modern platform does that. They are the ones that can explain how they encrypt data, who can decrypt it, and how they know that their encryption has not been compromised.
Ratifio's security architecture implements defence-in-depth encryption: AES-256 at rest, TLS 1.3 in transit, and SHA-256 document hashing for integrity. No shortcuts, no optional security tiers.
David leads Ratifio's security architecture. With a background in government digital services, he writes about tamper-proof audit trails, encryption standards, and building technology that regulators trust.
The insurance sector faces specific regulatory requirements for electronic signatures, from Solvency...
Government organisations must meet specific digital standards when implementing electronic document ...
Electronic signatures intersect with AML and KYC obligations in ways that many firms underestimate. ...