7.11 Cryptographic processes are isolatedΒΆ

Verify that all consumers of cryptographic services do not have direct access to key material. Isolate cryptographic processes, including master secrets and consider the use of a hardware key vault (HSM).

Levels: 3