PR.DS-02.228
Does your organization implement cryptographic controls to protect the confidentiality and integrity of network communications?
Explanation
Cryptographic controls such as encryption, digital signatures, and cryptographic hashes are essential for protecting sensitive data during transmission across networks. Encryption ensures that data cannot be read if intercepted, digital signatures verify the authenticity of the sender, and cryptographic hashes confirm that data hasn't been altered during transmission. These controls are particularly important for communications containing sensitive information, remote access connections, and public-facing web applications. Evidence could include a cryptographic controls policy document, network architecture diagrams showing where encryption is implemented, configuration screenshots of TLS/SSL settings on web servers, VPN configuration details, or results from network scanning tools that verify the use of secure protocols and cipher suites.
Implementation Example
Use encryption, digital signatures, and cryptographic hashes to protect the confidentiality and integrity of network communications
ID: PR.DS-02.228
Context
- Function
- PR: PROTECT
- Category
- PR.DS: Data Security
- Sub-Category
- The confidentiality, integrity, and availability of data-in-transit are protected

