Under active development Content is continuously updated and improved

5.1.15.1.1

>Control Description

+ All cryptographic procedures used (e.g. encryption, signature, and hash algorithms, protocols) provide the security required by the respective application field according to the recognized industry standard, - to the extent legally feasible.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.