5.1.1—5.1.1
>Control Description
+ All cryptographic procedures used (e.g. encryption, signature, and hash algorithms, protocols) provide the security required by the respective application field according to the recognized industry standard,
- to the extent legally feasible.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.