CRY-13
Cryptographic Hash
Description
Mechanisms exist to utilize hash algorithms to generate a hash value that can be used to validate the integrity of data and/or software.
Control Question
Does the organization utilize hash algorithms to generate a hash value that can be used to validate the integrity of data and/or software?
Control Metadata
Domain:
Cryptographic Protections
Validation Cadence:
Annual
