14.8: Encrypt Sensitive Information at Rest

CSF v1.1 References:

PF v1.0 References:

Threats Addressed:


Info icon.

The next version of the control set incorporates all or part of this control into: 3.11: Encrypt Sensitive Data at Rest.

Control Statement

Encrypt all sensitive information at rest using a tool that requires a secondary authentication mechanism not integrated into the operating system, in order to access the information.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]