Enisa Req

Source: Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures November 2017

# Requirement Nr Description Good Practice Is Fullfilled By Remarks
1 GP-TM-37 Support scalable key management schemes. Cryptography View
2 GP-TM-36 Build devices to be compatible with lightweight encryption and security techniques. Cryptography View
3 GP-TM-35 Cryptographic keys must be securely managed. Cryptography View
4 GP-TM-34 Ensure a proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of data and information (including control messages), in transit and in rest. Ensure the proper selection of standard and strong encryption algorithms and strong keys, and disable insecure protocols. Verify the robustness of the implementation. Cryptography View
Records : 4 of 4 | Page : of 1 | Limit