All resources
Cryptographic Inventory and Dependency Mapping
Where cryptography is used in organizations
Crypto appears in encryption at rest/transit, authentication, digital signatures, secure comms. Examples: TLS, certificates, VPNs, identity providers, document signing, backups. Many mechanisms use asymmetric cryptography. Usage is often embedded in products or inherited from vendors; understanding it requires IT, security, architecture, and procurement.