Under active development Content is continuously updated and improved

9.2(b)9.2(b)

>Control Description

based on point (a), the protocols or families of protocols to be adopted, as well as cryptographic algorithms, cipher strength, cryptographic solutions and usage practices to be approved and required for use in the relevant entities, following, where appropriate, a cryptographic agility approach;

Ask AI

Configure your API key to use AI features.