9.2(b)—9.2(b)
>Control Description
based on point (a), the protocols or families of protocols to be adopted, as well as cryptographic algorithms, cipher strength, cryptographic solutions and usage practices to be approved and required for use in the relevant entities, following, where appropriate, a cryptographic agility approach;
Ask AI
Configure your API key to use AI features.