6.7.3. Encryption policies