GDPR
Articles 25 and 32 — encryption, pseudonymisation, and data-by-design controls. Orvexium maps AES-256-GCM and field-level encryption to Art. 32 technical measures.
- Art. 32
- Art. 25
- DPIA Support
Orvexium maps each cryptographic control to specific regulatory requirements — from GDPR Article 32 encryption obligations and ISO/IEC 27001 Annex A controls to NIST CSF subcategories and SOC 2 Trust Service Criteria. Every control is evidence-backed and audit-ready.
Orvexium provides cryptographic controls evidence mapped to each framework's specific requirements — enabling security teams to demonstrate compliance without translating engineering documentation into audit language.
Articles 25 and 32 — encryption, pseudonymisation, and data-by-design controls. Orvexium maps AES-256-GCM and field-level encryption to Art. 32 technical measures.
Annex A controls A.8.24 (Use of Cryptography) and A.8.20 (Networks Security). Full ISMS control mapping with cryptographic policy templates and evidence documentation.
Protect function — PR.DS (Data Security) and PR.AC (Identity Management) subcategory mapping. Orvexium controls align to SP 800-53 Rev. 5 SC and IA control families.
Common Criteria CC6.x (Logical Access) and Availability A1.x. Cryptographic controls for CC6.7 (encryption in transit) and CC6.1 (access restriction) with audit evidence packages.
§164.312 Technical Safeguards — encryption and decryption of ePHI in transit and at rest. AES-256 encryption mapping with key management policy documentation for covered entities.
Requirements 3 (Protect Stored Account Data), 4 (Encrypt Transmission), and 12.3 (Risk-Targeted Analysis). P2PE-compatible key management controls and cardholder data encryption evidence.
Identify applicable frameworks based on industry, jurisdiction, data classification, and contractual obligations. Map system boundaries and data flows to regulatory scope.
Document existing cryptographic controls — encryption algorithms, key lengths, key management procedures, certificate lifecycles, and access controls — against framework requirements.
Cross-reference documented controls against each framework's specific requirements. Identify missing controls, weak implementations, and documentation deficiencies requiring remediation.
Prioritised remediation plan with Orvexium cryptographic controls mapped to each gap — including implementation guidance, evidence collection procedures, and audit artefact templates.