ISO/IEC 27001 Control 8.24: Use of cryptography

Control

Rules for the effective use of cryptography, including cryptographic key management, should be defined and implemented.

Necessity of MidPoint

MidPoint is not applicable for implementation of this control.

Implementation of the control is completely outside the scope of identity governance and administration (IGA).

Rationale

MidPoint has no significant capabilities that can assist with use of cryptography.

Was this page helpful?
YES NO
Thanks for your feedback