18.5: Use Only Standardized and Extensively Reviewed Encryption Algorithms
Threats Addressed:
The next version of the control set incorporates all or part of this control into: 16.11: Leverage Vetted Modules or Services for Application Security Components.
Control Statement
Use only standardized, currently accepted, and extensively reviewed encryption algorithms.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]