7.11 Cryptographic processes are isolatedΒΆ
Verify that all consumers of cryptographic services do not have direct access to key material. Isolate cryptographic processes, including master secrets and consider the use of a hardware key vault (HSM).
Levels: 3