ISO/IEC 27001 Control 8.24: Use of cryptography
Control
Rules for the effective use of cryptography, including cryptographic key management, should be defined and implemented.
Necessity of MidPoint
MidPoint is not applicable for implementation of this control.
Implementation of the control is completely outside the scope of identity governance and administration (IGA).
Rationale
MidPoint has no significant capabilities that can assist with use of cryptography.
Related Controls
Was this page helpful?
YES
NO
Thanks for your feedback