Article 9.4(d)—Article 9.4(d)
>Control Description
implement policies and protocols for strong authentication mechanisms, based on relevant standards and dedicated control systems, and protection measures of cryptographic keys whereby data is encrypted based on results of approved data classification and ICT risk assessment processes;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.