Encryption is not a nice-to-have in the Aramco CCC framework -- it is a hard requirement with specific protocols named in the standard. SACS-002 TPC-52 mandates that all data transmitted across networks must be encrypted, and it explicitly lists the acceptable protocols. If your organization still transfers files via plain FTP, accesses systems over unencrypted RDP, or runs internal web tools over HTTP, this article explains exactly what needs to change and how each encryption requirement maps to a practical infrastructure component.

TPC-52: The Core Encryption Mandate

SACS-002 TPC-52: Data in transit must be protected using encryption technologies including but not limited to SSH, FTPS, HTTPS, TLS, or IPSec.

TPC-52 is one of the most technically demanding general controls in SACS-002 because it affects every system, every connection, and every data flow in your organization. It is not limited to internet-facing systems -- any data moving between two systems, including internal transfers between servers on your own network, must be encrypted using one of the approved protocols.

The standard names five specific protocols. In practice, these cover virtually every data transfer scenario a vendor encounters:

What This Means in Practice

Let us walk through the common data transfer scenarios in a typical Aramco vendor's environment and identify what TPC-52 requires for each.

Remote Access to Servers and Desktops

If your employees access servers remotely -- whether for system administration, application maintenance, or daily work -- the connection must be encrypted. This means:

File Transfers

Transferring files between systems -- whether uploading documents, exchanging data with Aramco, or backing up files to remote storage -- must use encrypted protocols:

Common audit failure: Vendors often have legacy systems or scripts that use plain FTP for automated file transfers. These are easily overlooked during compliance preparation but will be flagged during the technical review. Audit every automated process and cron job for unencrypted protocols.

VPN and Network Encryption

If your employees work remotely or access company systems from outside the office, a VPN with IPSec encryption is the standard approach for TPC-52 compliance. The VPN creates an encrypted tunnel between the employee's device and your company network, protecting all data that flows through it.

Key VPN requirements for SACS-002 compliance:

Web Interfaces and Applications

Every web-based system in your environment must use HTTPS:

HTTPS requires a valid TLS certificate. The certificate should be from a recognized Certificate Authority (CA), use TLS 1.2 or higher (TLS 1.0 and 1.1 are deprecated), and the server should be configured to disable weak cipher suites.

Email Transport Encryption

While email security has its own dedicated TPC controls, email transport also falls under TPC-52. Email servers must support STARTTLS for encrypting SMTP connections between mail servers. This ensures that emails are encrypted in transit between your mail server and the recipient's mail server.

Data-at-Rest Encryption

While TPC-52 focuses specifically on data in transit, CCC+ vendors (Outsourced Infrastructure, Customized Software, and Critical Data Processor classifications) face additional requirements for encrypting data at rest. This means:

Note: Even for CCC (non-plus) vendors, encrypting data at rest is a strong best practice that auditors view favorably. If you store any Aramco-related documents, contracts, or correspondence, encrypting the storage volume protects you in the event of physical media theft or unauthorized access.

Wireless Network Encryption

SACS-002 also addresses wireless network security. If your office uses Wi-Fi, the wireless network must be encrypted using WPA2 or WPA2 Enterprise (WPA3 is also acceptable). Open Wi-Fi networks and WEP encryption are prohibited.

For environments handling Aramco data:

Encryption Requirements Mapped to Infrastructure

The following table maps each encryption scenario to the protocol required by SACS-002 and the corresponding MassiveGRID package component that satisfies it.

Protocol Use Case Package Component TPC Reference
IPSec (IKEv2) Remote access VPN for employees working outside the office Managed VPN with IPSec encryption, MFA-integrated authentication TPC-52
SSH Remote server administration (Linux) Cloud server with SSH-only access, key-based authentication enforced TPC-52
SFTP / FTPS Encrypted file uploads, document exchange, automated transfers Encrypted file hosting with SFTP/FTPS endpoints, web interface over HTTPS TPC-52
HTTPS (TLS 1.2+) Web interfaces, admin panels, email webmail, API endpoints All web services delivered over HTTPS with managed TLS certificates TPC-52
TLS (STARTTLS) Email transport encryption between mail servers Email hosting with STARTTLS enforced on all SMTP connections TPC-52, TPC-8
RDP over TLS Remote desktop access to Windows systems Managed RDP with NLA and TLS encryption, accessed through VPN TPC-52
AES-256 (at rest) Disk encryption for stored data, backups, databases Encrypted storage volumes on cloud servers, encrypted backup service CCC+ specific controls
WPA2/WPA3 Office wireless network encryption On-premise requirement (configuration guidance provided) TPC-52

Producing Audit Evidence for Encryption Controls

Implementing encryption is only half the requirement -- you must also prove it to the auditor. For each encryption control, expect to provide:

Common Encryption Gaps That Cause Audit Failures

These are the most frequently encountered encryption-related findings during CCC audits:

  1. Plain FTP still in use -- Often in legacy systems or automated scripts that were set up years ago and forgotten
  2. HTTP admin panels -- Internal tools accessed without HTTPS because "they are only on the internal network" (SACS-002 does not distinguish between internal and external)
  3. Outdated TLS versions -- Systems still supporting TLS 1.0 or 1.1, or using weak cipher suites like RC4 or 3DES
  4. VPN without IPSec -- Using PPTP (which is broken) or L2TP without IPSec encryption
  5. Unencrypted database connections -- Application servers connecting to databases over unencrypted TCP
  6. RDP exposed to the internet without VPN -- Even with TLS on RDP, direct internet exposure adds unnecessary risk
  7. Open Wi-Fi or WEP -- Surprising in 2026, but some offices still run legacy wireless configurations

Build Encryption Into Your Infrastructure From Day One

The most efficient way to satisfy TPC-52 and the broader encryption requirements is to start with infrastructure that is encrypted by default. Retrofitting encryption onto existing systems is error-prone -- you must audit every service, every port, every automated process. Starting with a platform where encryption is the baseline eliminates this risk.

MassiveGRID's Aramco CCC-Compliant Infrastructure Package delivers every component with encryption pre-configured. The VPN uses IKEv2/IPSec with AES-256 encryption. File hosting runs on SFTP with plain FTP disabled at the server level. All web interfaces use HTTPS with TLS 1.2+ and modern cipher suites. RDP is tunneled through the VPN, adding network-layer encryption on top of TLS. And every encryption configuration is documented with evidence ready for your auditor.

See how the CCC-compliant package handles encryption across every component →