⚠
BowTie Risk
Assessments
Hazards
Library
Implementations
Guide
← Back
Edit Barrier
Name
Type
Prevention
Mitigation
General
Category
Tags
(comma-separated)
Description
Apply cryptographic controls to protect the confidentiality and integrity of information at rest and in transit. Policies shall define approved algorithms, key lengths, key management lifecycle, and review cycles as standards evolve. Applies across IT (ISO 27002 8.24) and industrial control systems (IEC 62443 SR 4.3).
Save changes
Cancel