On this page💼 21 Implementation of controls - Cryptographic techniques to restrict access ID: /frameworks/apra-cpg-234/21 Description​ Empty... Similar​ Internal ID: dec-b-c41b9d5c Sub Sections​ SectionSub SectionsInternal RulesPoliciesFlagsCompliance💼 54 Cryptographic techniques can be used to control access to sensitive data, both in storage and in transit. The strength of the cryptographic techniques deployed would be commensurate with the sensitivity and criticality of the data as well as other supplementary or compensating controls (refer to Attachment E for further guidance).2122no data💼 55 In order to minimise the risk of compromise, an end-to-end approach would typically be adopted, where encryption is applied from the point-of-entry to final destination.11no data