💼 55 In order to minimise the risk of compromise, an end-to-end approach would typically be adopted, where encryption is applied from the point-of-entry to final destination.
- Contextual name: 💼 55 In order to minimise the risk of compromise, an end-to-end approach would typically be adopted, where encryption is applied from the point-of-entry to final destination.
- ID:
/frameworks/apra-cpg-234/21/55
- Located in: 💼 21 Implementation of controls - Cryptographic techniques to restrict access
Description
Empty...
Similar
- Internal
- ID:
dec-c-73f46940
- ID:
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (1)
Policy | Logic Count | Flags |
---|---|---|
📝 Azure Key Vault Private Endpoints are not used 🟢 | 1 | 🟢 x6 |
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-807a37c9 | 1 |