ISM-0465—ISM-0465
>Control Description
Cryptographic equipment or software that has completed a Common Criteria evaluation against a Protection Profile is used to protect OFFICIAL: Sensitive or PROTECTED data when communicated over insufficiently secure networks, outside of appropriately secure areas or via public network infrastructure.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.