6. Cryptographic Controls
This category focuses on the effective use of cryptographic techniques to protect the confidentiality, integrity, and authenticity of information. It includes implementing cryptographic solutions, managing cryptographic keys, and ensuring the secure handling and storage of sensitive data.
Controls (A.10):
Control A.10.1.1: Policy on the Use of Cryptographic Controls
Control A.10.1.2: Key Management
Last updated