IBM Cloud Docs
SC-28 (1) - Cryptographic Protection

SC-28 (1) - Cryptographic Protection

Control requirements

SC-28 (1) - 0

Implement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following information at rest on [IBM Assignment: organization-defined information system components including portable computers, mobile devices, and electronic removable media]: [IBM Assignment: confidential customer data].

NIST supplemental guidance

The selection of cryptographic mechanisms is based on the need to protect the confidentiality and integrity of organizational information. The strength of mechanism is commensurate with the security category or classification of the information. Organizations have the flexibility to encrypt information on system components or media or encrypt data structures, including files, records, or fields.