Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.
Last updated 1 year ago