Under active development Content is continuously updated and improved

Article 9.4(d)Article 9.4(d)

>Control Description

implement policies and protocols for strong authentication mechanisms, based on relevant standards and dedicated control systems, and protection measures of cryptographic keys whereby data is encrypted based on results of approved data classification and ICT risk assessment processes;

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.