Describe your application’s architecture and tiered design
Describe your application’s architecture and tiered design
OperationsCommander maintains a documented description of the cryptographic architecture in place, including details of all algorithms, protocols, and keys used for the protection of stored account data. The cryptographic architecture description covers key strength and expiry dates, preventing the use of the same cryptographic keys in production and test environments, description of key usage, and an inventory of hardware security modules (HSMs), key management systems (KMS), and other secure cryptographic devices used for key management.