3.6—Encrypt Data on End-User Devices
IG1
IG2
IG3
Data
Protect
>Control Description
Encrypt data on end-user devices containing sensitive data. Example implementations can include: Windows BitLocker®, Apple FileVault®, Linux® dm-crypt.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.