Documented standards/procedures for the use of cryptography across the enterprise should PRIMARILY:

Documented standards/procedures for the use of cryptography across the enterprise should
PRIMARILY:

Documented standards/procedures for the use of cryptography across the enterprise should
PRIMARILY:

A.
define the circumstances where cryptography should be used.

B.
define cryp,0£raphic algorithms and key lengths.

C.
describe handling procedures of cryptographic keys.

D.
establish the use of cryptographic solutions.

Explanation:

There should be documented standards- procedures for the use of cryptography across the
enterprise; they should define the circumstances where cryptography should be used. They should
cover the selection of cryptographic algorithms and key lengths, but not define them precisely, and
they should address the handling of cryptographic keys. However, this is secondary to how and
when cryptography should be used. The use of cryptographic solutions should be addressed but,
again, this is a secondary consideration.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Ali imran

Ali imran

Policy would define the circumstances where cryptography should be used