QubixorEN|FR
All resources

Cryptographic Inventory and Dependency Mapping

Where cryptography is used in organizations

Crypto appears in encryption at rest/transit, authentication, digital signatures, secure comms. Examples: TLS, certificates, VPNs, identity providers, document signing, backups. Many mechanisms use asymmetric cryptography. Usage is often embedded in products or inherited from vendors; understanding it requires IT, security, architecture, and procurement.