Title
CRYPTOGRAPHIC PROTECTION
Description
The information system implements cryptographic mechanisms to protect the integrity of audit information and audit tools.
Supplemental
Cryptographic mechanisms used for protecting the integrity of audit information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash.
Reference Item Details
Related: AU-10,SC-12,SC-13
Category: AUDIT AND ACCOUNTABILITY
Parent Title: PROTECTION OF AUDIT INFORMATION
Family: AUDIT AND ACCOUNTABILITY