CRY-13 ยท Cryptographic Hash

Control Description

Mechanisms exist to utilize hash algorithms to generate a hash value that can be used to validate the integrity of data and/or software.

Control Question
Assessment question for control validation

Does the organization utilize hash algorithms to generate a hash value that can be used to validate the integrity of data and/or software?

Control Weighting
5
Validation Cadence
Annual
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
ESP Level 3: CRY-13
Errata & Additional Notes

- new control