๐ผ 1 Cryptographic techniques refer to methods used to encrypt data, confirm its authenticity or verify its integrity. The following are examples where APRA-regulated entities could deploy cryptographic techniques given the risks involved:
- ID:
/frameworks/apra-cpg-234/e/1
Descriptionโ
Empty...
Similarโ
- Internal
- ID:
dec-c-dd7210a2
- ID:
Sub Sectionsโ
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| ๐ผ a. transmission and storage of critical and/or sensitive data in an โuntrustedโ environment or where a higher degree of security is required; | no data | ||||
| ๐ผ b. detection of any unauthorised alteration of data; | no data | ||||
| ๐ผ c. verification of the authenticity of transactions or data; | no data | ||||
| ๐ผ d. protection of customer PINs which are typically used for debit/credit cards and online services. | no data |