Encryption is not a “nice to have”.
Used properly, it is one of the most effective controls for protecting information.
Used poorly, it creates risk, fragility, and false confidence.
Annex A 8.24 exists to ensure organisations use cryptography in a controlled, consistent, and risk-appropriate way, protecting information confidentiality, integrity, authenticity, and availability.
This control is about governance of cryptography, not just switching encryption on.

Annex A 8.24 of ISO 27001:2022 focuses on the use of cryptographic techniques.
At a practical level, this means:
The control does not mandate specific algorithms or products. It expects clear rules, ownership, and disciplined implementation.
Cryptography is used to:
However, cryptography introduces risk when:
Annex A 8.24 ensures organisations use cryptography deliberately and safely, rather than relying on ad hoc or default implementations.
This control replaces ISO 27001:2013 Annex A 10.1.1 and 10.1.2, consolidating cryptographic use and key management into a single, clearer requirement.
A pragmatic approach to Annex A 8.24 typically includes the following elements.
Organisations should establish a policy covering:
The policy should align with:
Cryptography without policy quickly becomes inconsistent.
Cryptography should be applied where it supports security objectives, such as:
Not all information requires the same level of cryptographic protection.
Organisations should consider:
This informs:
Strong cryptography applied in the wrong place is still ineffective.
Annex A 8.24 expects organisations to define and enforce rules covering:
This prevents:
Standards reduce variability — and variability is risk.
Key management is central to Annex A 8.24.
Organisations should define processes for:
Poor key management undermines even the strongest encryption.
Keys should be protected against:
Controls may include:
Keys often require stronger protection than the data they protect.
Annex A 8.24 expects clarity on:
Cryptography without ownership degrades rapidly.
Encryption can affect:
Organisations should ensure:
Security controls should work together, not blind each other.
Cryptography is subject to:
Organisations should consider:
Ignoring legal constraints creates compliance risk.
Where cryptography is provided by third parties, organisations should ensure:
Outsourced cryptography is still organisational risk.
Cryptographic effectiveness changes over time.
Organisations should periodically review:
Cryptography that was strong yesterday may be weak tomorrow.
Annex A 8.24 does not require:
It does require organisations to:
Lost keys can be as damaging as stolen data.
Cryptography fails most often through governance gaps.
Annex A 8.24 is about using cryptography as a controlled security capability, not a checkbox.
When cryptography is implemented effectively:
Encryption protects information.
Governance protects encryption.
Annex A 8.24 ensures organisations do both.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today