5.20 Encryption - 'If keys are stored in a table in the database, access to the keys should be limited under a secure role'

Information

combination of methods will be dependent on how and where the keys are stored.

See Also

https://workbench.cisecurity.org/files/580