4.3 Cryptography

Cryptographic controls shall be used in accordance with agreements, legislation, and regulations to protect sensitive information.

  • Use approved cryptographic algorithms and key lengths
  • Implement proper key management practices
  • Encrypt sensitive data in transit and at rest
  • Regularly review and update cryptographic implementations
Direct URL: