Focusing on storage and usage within an organization and augmenting standard information security practices, the certification was created specifically for the crypto industry. For example, it analyzes how a provider generates keys, the hardware it uses and how the policy and workflow engine works, as well as the cybersecurity controls used.
Credit: Source link