Skip to main content
FAQ Question

How do I leverage ECA certificates to adhere to DoD Cybersecurity requirements?

FAQ Answer

With the increase of Cybersecurity awareness, the DoD requires that “Data in Transit” such as email, needs to be secured if it contains sensitive data.

The three main capabilities for ECA certificates are: 

  1. Authentication: ECA Digital Certificates enable you to virtually authenticate yourself online and gain access into a secure DoD system that is PKI enabled and requires a DoD approved Digital Certificate.
  2. Digital Signing: ECA certificates can be used to digitally sign documents and emails which verifies the identity of the sender or signer and also ensures that the integrity of the document has not been compromised since the time that it was signed.
  3. Encryption: ECA certificates also has the capability of encrypting emails. This ensures that only the intended authorized recipients will be able to open and view the document.

When items 2 and 3 above are used in combination this signing and encrypting process meets the DoD’s requirements for securing DoD “Data in Transit”.

Learn more about DoD cybersecurity compliance.