๐ผ a. use of physically and logically protected devices and environments to store and generate cryptographic keys, generate PINs and perform encryption and decryption. In most cases this would involve the use of Hardware Security Modules10 (HSMs) or similarly secured devices;
- Contextual name: ๐ผ a. use of physically and logically protected devices and environments to store and generate cryptographic keys, generate PINs and perform encryption and decryption. In most cases this would involve the use of Hardware Security Modules10 (HSMs) or similarly secured devices;
- ID:
/frameworks/apra-cpg-234/e/5/a
- Located in: ๐ผ 5 An APRA-regulated entity would typically deploy, where relevant, controls to limit access to cryptographic keys, including:
Descriptionโ
Empty...
Similarโ
- Internal
- ID:
dec-c-66bca283
- ID:
Sub Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|