Requirement:
The cybersecurity requirements for cryptography must be implemented.
Control Implementation Guidelines:
- Implement all cybersecurity requirements to the organization's approved cryptography procedures. It is also recommended that the cryptography procedures cover the following, but not limited to:
- Standard controls of approved cryptography solutions and applicable restrictions (technically and regulatorily)
- Secure management of cryptographic keys during their lifecycle
- Information must be encrypted in transit and storage based on classification as well as the relevant laws and regulations
- Approved cryptographic hash functions should be defined based on national cryptographic standard controls
- Implementation of cryptography to technical and information assets
- Use of approved TLS certificates for web servers and public applications issued by a trusted third party
Expected Deliverables:
- An action plan to implement cybersecurity requirements for cryptography
- Evidence showing the uses modern cryptography technologies in the organization (e.g., the presence of advanced encryption technologies in the organization, security procedures and standard controls that support the implementation of cryptography in the organization)
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you