Purchase this Document
Price: $195.00 USD (PAGES: 9)
To purchase this document, you will need to register or sign in above.
Sudden and unpredictable algorithmic and cryptographic compromises can leave application security at risk. Security and risk management leaders must prepare for these events by crafting agile response plans.
Table of Contents
Build Crypto-Agility Into Application Development or Application Procurement Workflow
Inventory the Applications That Use Cryptography, and Identify and Evaluate Your Dependence on Algorithms
Include Cryptographic Alternatives and an Algorithm Swap-Out Procedure in Your Existing Incident Response Plans
- Build Crypto-Agility Into Application Development or Application Procurement Workflow
Gartner Recommended Reading