5.20 Encryption - 'If keys are stored in a table in the database, access to the keys should be limited under a secure role'

Information

Assign multiple layers of protection, within the limits of what can be managed, to ensure the security of the encryption keys. The

See Also

https://workbench.cisecurity.org/files/580