CEK-04: Are appropriate data protection encryption algorithms used that consider data
classification, associated risks, and encryption technology usability?
Control implemented
Control ownership
Description
Use encryption algorithms that are appropriate for data protection,
considering the classification of data, associated risks, and usability of the
encryption technology.