Resiliency mechanisms exist to ensure the availability of data in the event of the loss of cryptographic keys.
Does the organization ensure the availability of data in the event of the loss of cryptographic keys?