Testing the Configuration of Cryptographic Standard Algorithms
Verify that custom cryptographic code is configured with secure defaults and does not contain any cryptographic vulnerabilities and/or weaknesses. Ensure that the code follow best practices, does not contain configuration issues or make use of algorithms that are deprecated or used incorrectly.