2.4.9.5
| Req No | Requirement | Compliance Class And Applicability | Primary Keyword | Secondary Keyword | 
|---|---|---|---|---|
| 2.4.9.5 | All the product related cryptographic functions have no publicly known unmitigated weaknesses in the algorithms or implementation, for example MD5 and SHA-1 are not used. | Mandatory for Class 1 and above | Business | Process |