SAMMY UI is optimized for resolutions with a width 1024px and higher.
Data Encryption
CEK-03: Are data at-rest and in-transit cryptographically protected using cryptographic libraries certified to approved standards?
Data protection/data encryption is the process of changing plaintext into ciphertext using a cryptographic algorithm and key.
a. Organizations should be able to either encrypt all information on storage devices (i.e., full disk encryption) or encrypt specific data structures (e.g., files, records, or fields).
b. Data at rest involves databases, end-user workstations, and file servers.
c. Data in transit involves system interfaces, public networks, and electronic messaging.
d. Cryptography provides data protection: confidentiality, integrity, availability, and source authentication.
e. Cryptographic key management system security policies rules need to protect the confidentiality, integrity, availability, and source authentication of all keys, algorithms, and metadata.
f. Key management technology and processes should be NIST FIPS validated and/or National Security Agency (NSA)-approved by other relevant international standardization bodies.
g. Approved algorithms and key sizes should reside in the CKMS.
h. Quantum-resistant encryption is developing quickly, and it is recommended that this technology is closely monitored so the organization is not exposed.
Control implemented
Control ownership
Description

Provide cryptographic protection to data at-rest and in-transit, using cryptographic libraries certified to approved standards.