Under active development Content is continuously updated and improved

ISM-0465ISM-0465

>Control Description

Cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile is used to protect OFFICIAL: Sensitive or PROTECTED data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.