Cryptographic mechanisms exist to protect the integrity of data being transmitted.
Cryptographic mechanisms exist to protect the integrity of data being transmitted.
Cryptographic mechanisms exist to prevent unauthorized disclosure of data at rest.
Cryptographic mechanisms exist to protect the confidentiality and integrity of sensitive/regulated data residing on storage media.
Mechanisms exist to remove unused data from online storage and archive it off-line in a secure location until it can be disposed of according to data retention requirements.
Mechanisms exist to ensure that database servers utilize encryption to protect the confidentiality of the data within the databases.
Cryptographic mechanisms exist to protect the confidentiality and integrity of non-console administrative access.
Mechanisms exist to protect wireless access via secure authentication and encryption.
Mechanisms exist to securely implement an internal Public Key Infrastructure (PKI) infrastructure or obtain PKI services from a reputable PKI service provider.
Resiliency mechanisms exist to ensure the availability of data in the event of the loss of cryptographic keys.
Mechanisms exist to facilitate cryptographic key management controls to protect the confidentiality, integrity and availability of keys.