Control: ism-0462; Revision: 7; Updated: Mar-22; Applicability: ALL; Essential Eight: N/A
When a user authenticates to the encryption functionality of ICT equipment or media, it is treated in accordance with its original sensitivity or classification until the user deauthenticates from the encryption functionality.