CRY-01—Use of Cryptographic Controls
Weight: 10
>Control Description
Mechanisms exist to facilitate the implementation of cryptographic protections controls using known public standards and trusted cryptographic technologies.
>Cross-Framework Mappings
CMMC v2.0
Australia ISM
ISM-0142
CompareISM-0457
CompareISM-0460
CompareISM-0471
CompareISM-0472
CompareISM-0474
CompareISM-0475
CompareISM-0476
CompareISM-0477
CompareISM-0479
CompareISM-0481
CompareISM-0499
CompareISM-0501
CompareISM-0994
CompareISM-0999
CompareISM-1080
CompareISM-1091
CompareISM-1146
CompareISM-1446
CompareISM-1629
CompareISM-1759
CompareISM-1761
CompareISM-1762
CompareISM-1763
CompareISM-1764
CompareISM-1765
CompareISM-1766
CompareISM-1767
CompareISM-1768
CompareISM-1769
CompareISM-1770
CompareISM-1771
CompareISM-1772
CompareISM-1917
CompareSOC 2 TSC (Detailed)
NIST SP 800-171A Rev 3
NIST SP 800-207 Zero Trust
FBI CJIS
GLBA (16 CFR 314)
HIPAA Simplification 2013
NERC CIP
Ask AI
Configure your API key to use AI features.