10 – Cryptography
Select > > > > > > Reports > .
Control 10: Cryptography of the ISO 27002 standard focuses on using cryptographic keys to protect the confidentiality, integrity, and availability of information.
To assess your enterprise's compliance with this requirement, use the following reports:
| Dashboards | Reports |
|---|---|
|
n/a |
|
- Insecure Cryptographic Storage
- Reports vulnerabilities associated with insecure cryptographic storage detected on your systems. The table provides results by IP address and name of the asset, the detected vulnerability, and when the most recent event occurred.
- Invalid Certificates
- Reports events that indicate an error with a server's certificate. The chart displays the number of such occurrences per host. The table provides results by the name of the event, the IP address and host name of the server, the user associated with event, the number of events, and when the event occurred.
- Systems Providing Unencrypted Services
- Reports the systems that provide unencrypted services. The table provides results by the port, process, service, IP address of the system, and the number of events.