Skip to main content

๐Ÿ’ผ 21 Implementation of controls - Cryptographic techniques to restrict access

  • Contextual name: ๐Ÿ’ผ 21 Implementation of controls - Cryptographic techniques to restrict access
  • ID: /frameworks/apra-cpg-234/21
  • Located in: ๐Ÿ’ผ APRA CPG 234

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-c41b9d5c

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 54 Cryptographic techniques can be used to control access to sensitive data, both in storage and in transit. The strength of the cryptographic techniques deployed would be commensurate with the sensitivity and criticality of the data as well as other supplementary or compensating controls (refer to Attachment E for further guidance).1718
๐Ÿ’ผ 55 In order to minimise the risk of compromise, an end-to-end approach would typically be adopted, where encryption is applied from the point-of-entry to final destination.11