SC-13: Cryptographic Protection
From NIST's SP800-53:
a. Determine the [Assignment: organization-defined cryptographic uses]; and b. Implement the following types of cryptography required for each specified cryptographic use: [Assignment: organization-defined types of cryptography for each specified cryptographic use].
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
PR.DS-5 | Protections against data leaks are implemented |
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.