Skip to content
arrow_back
search
Annex A 8.24 verified ISO/IEC 27001:2022

Effective Use of Cryptography and Key Management

Create and enforce rules for using cryptography and managing keys effectively.

record_voice_over

Plain language

This control is about setting up and following rules to properly use cryptography, which is a way to protect sensitive information by scrambling it. If done poorly, your private information could be exposed to hackers, leading to serious breaches of privacy and trust.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Technological controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

12 Apr 2026

Maturity levels

N/A

Official control statement

Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.
verified ISO/IEC 27001:2022 Annex A 8.24
priority_high

Why it matters

Poor cryptography and key management can expose sensitive data to attackers, leading to costly data breaches and loss of customer trust.

settings

Operational notes

Audit key management; use approved current algorithms; protect keys (HSM/KMS); rotate and revoke keys; log and review crypto/key events.

Mapping detail

Mapping

Direction

Controls