10 – Cryptography

Select Reports > Portal > Repository > Standard Content > IT GOV > ISO-27002 > Reports > ISO 10 – Cryptography.

Control 10: Cryptography of the ISO 27002 standard focuses on using cryptographic keys to protect the confidentiality, integrity, and availability of information.

To assess your enterprise's compliance with this requirement, use the following reports:

Dashboards Reports

n/a

Insecure Cryptographic Storage

Invalid Certificates

Systems Providing Unencrypted Services

 

Insecure Cryptographic Storage
Reports vulnerabilities associated with insecure cryptographic storage detected on your systems. The table provides results by IP address and name of the asset, the detected vulnerability, and when the most recent event occurred.
Invalid Certificates
Reports events that indicate an error with a server's certificate. The chart displays the number of such occurrences per host. The table provides results by the name of the event, the IP address and host name of the server, the user associated with event, the number of events, and when the event occurred.
Systems Providing Unencrypted Services
Reports the systems that provide unencrypted services. The table provides results by the port, process, service, IP address of the system, and the number of events.